Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk & Modeling
CSSLP 2019
| Intermediate
- 9 Videos | 30m 29s
- Includes Assessment
- Earns a Badge
This course explores the use of architectural risk assessment to identify flaws in software, and to determine risks. You will learn to use security management interfaces, and how to design and integrate the interfacing security functionality with existing software to meet an enterprise's security objectives. This 9-video course will examine upstream/downstream software development and compatibility, the types of design decisions when encountering interconnectivity with other applications, and any considerations concerning key sharing, single sign-on, token-based security, and delegation of trust. You will learn the two types of channels, message passing and shared memory channels, for communication between two entities. Next, learn how to do a proper architectural risk analysis by using vulnerability analysis, ambiguity analysis, and platform vulnerability analysis. Learners then use an engineering goal-oriented model to evaluate security, and learn how to use an NFR (nonfunctional requirements) framework. Finally, the course examines data classification. This course can be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecognize how to model typical threats, including advanced persistent threats, insider threats, common malware, and third-party/supplierdescribe secure interface design for security management interfaces, out-of-band management, and log interfacesdescribe upstream and downstream dependencies such as key and data sharing between appsdescribe protocol design choices such as APIs, weaknesses, state, and models
-
identify common architecture frameworksmodel non-functional security properties and constraintsmodel and classify datasummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 38sUP NEXT
-
2.Modeling Typical Threats4m 14s
-
3.Security Management Interfaces3m 30s
-
4.Upstream and Downstream Dependencies3m 43s
-
5.Channels and Protocols2m 40s
-
6.Architectural Risk Analysis7m 38s
-
7.Modeling Security Properties and Constraints1m 59s
-
8.Modeling and Classifying Data3m 58s
-
9.Course Summary1m 10s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.