Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk & Modeling

CSSLP 2019
  • 9 Videos | 33m 59s
  • Includes Assessment
  • Earns a Badge
Likes 12 Likes 12
This course explores the use of architectural risk assessment to identify flaws in software, and to determine risks. You will learn to use security management interfaces, and how to design and integrate the interfacing security functionality with existing software to meet an enterprise's security objectives. This 9-video course will examine upstream/downstream software development and compatibility, the types of design decisions when encountering interconnectivity with other applications, and any considerations concerning key sharing, single sign-on, token-based security, and delegation of trust. You will learn the two types of channels, message passing and shared memory channels, for communication between two entities. Next, learn how to do a proper architectural risk analysis by using vulnerability analysis, ambiguity analysis, and platform vulnerability analysis. Learners then use an engineering goal-oriented model to evaluate security, and learn how to use an NFR (nonfunctional requirements) framework. Finally, the course examines data classification. This course can be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recognize how to model typical threats, including advanced persistent threats, insider threats, common malware, and third-party/supplier
    describe secure interface design for security management interfaces, out-of-band management, and log interfaces
    describe upstream and downstream dependencies such as key and data sharing between apps
    describe protocol design choices such as APIs, weaknesses, state, and models
  • identify common architecture frameworks
    model non-functional security properties and constraints
    model and classify data
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 38s
    UP NEXT
  • Playable
    2. 
    Modeling Typical Threats
    4m 14s
  • Locked
    3. 
    Security Management Interfaces
    3m 30s
  • Locked
    4. 
    Upstream and Downstream Dependencies
    3m 43s
  • Locked
    5. 
    Channels and Protocols
    2m 40s
  • Locked
    6. 
    Architectural Risk Analysis
    7m 38s
  • Locked
    7. 
    Modeling Security Properties and Constraints
    1m 59s
  • Locked
    8. 
    Modeling and Classifying Data
    3m 58s
  • Locked
    9. 
    Course Summary
    1m 10s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE