Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk & Modeling

CSSLP 2019    |    Intermediate
  • 9 videos | 30m 29s
  • Includes Assessment
  • Earns a Badge
Rating 3.6 of 59 users Rating 3.6 of 59 users (59)
This course explores the use of architectural risk assessment to identify flaws in software, and to determine risks. You will learn to use security management interfaces, and how to design and integrate the interfacing security functionality with existing software to meet an enterprise's security objectives. This 9-video course will examine upstream/downstream software development and compatibility, the types of design decisions when encountering interconnectivity with other applications, and any considerations concerning key sharing, single sign-on, token-based security, and delegation of trust. You will learn the two types of channels, message passing and shared memory channels, for communication between two entities. Next, learn how to do a proper architectural risk analysis by using vulnerability analysis, ambiguity analysis, and platform vulnerability analysis. Learners then use an engineering goal-oriented model to evaluate security, and learn how to use an NFR (nonfunctional requirements) framework. Finally, the course examines data classification. This course can be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how to model typical threats, including advanced persistent threats, insider threats, common malware, and third-party/supplier
    Describe secure interface design for security management interfaces, out-of-band management, and log interfaces
    Describe upstream and downstream dependencies such as key and data sharing between apps
    Describe protocol design choices such as apis, weaknesses, state, and models
  • Identify common architecture frameworks
    Model non-functional security properties and constraints
    Model and classify data
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 38s
  • 4m 14s
    Upon completion of this video, you will be able to recognize how to model typical threats, including advanced persistent threats, insider threats, common malware, and third-party/supplier threats. FREE ACCESS
  • Locked
    3.  Security Management Interfaces
    3m 30s
    After completing this video, you will be able to describe secure interface design for security management interfaces, out-of-band management, and log interfaces. FREE ACCESS
  • Locked
    4.  Upstream and Downstream Dependencies
    3m 43s
    After completing this video, you will be able to describe upstream and downstream dependencies, such as key and data sharing between apps. FREE ACCESS
  • Locked
    5.  Channels and Protocols
    2m 40s
    Upon completion of this video, you will be able to describe protocol design choices such as APIs, weaknesses, state, and models. FREE ACCESS
  • Locked
    6.  Architectural Risk Analysis
    7m 38s
    In this video, you will learn how to identify common architecture frameworks. FREE ACCESS
  • Locked
    7.  Modeling Security Properties and Constraints
    1m 59s
    In this video, you will learn how to model non-functional security properties and constraints. FREE ACCESS
  • Locked
    8.  Modeling and Classifying Data
    3m 58s
    Find out how to model and classify data. FREE ACCESS
  • Locked
    9.  Course Summary
    1m 10s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 498 users Rating 4.6 of 498 users (498)
Rating 4.5 of 128 users Rating 4.5 of 128 users (128)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 280 users Rating 4.5 of 280 users (280)
Rating 4.5 of 85 users Rating 4.5 of 85 users (85)
Rating 4.6 of 118 users Rating 4.6 of 118 users (118)