Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices

CSSLP 2019
  • 19 Videos | 1h 20m 10s
  • Includes Assessment
  • Earns a Badge
Likes 83 Likes 83
In this 19-video course, learners will explore the intricate world of secure coding practices. Topics covered in detail include declarative versus imperative (programmatic) security—whether the security is part of the application or part of the container. Next, survey defensive coding practices and control such as secure configuration, error handling, and session management. Learners will also explore cryptography, input and output sanitization, error handling, input validation, logging and auditing, and session and exception management. You will learn important information about safe application programming interfaces (APIs), including those that offer different types of functionality, such as Microsoft's Crypto API and Python's pycrypto, which both provide cryptographic functions; popular social media platforms provide their own APIs that programmers can tap into while incorporating aspects of those services. Learn more about useful concepts such as concurrency, type safety, memory management, configuration parameter management, tokenizing, and sandboxing. The course may be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recognize characteristics of declarative security
    recognize characteristics of programmatic security
    recognize how to use defensive coding practice to address concurrency issues leading to race condition
    recognize examples of using configuration as a defensive coding practice
    recognize cryptography elements such as storage, agility, encryption, and algorithm selection
    recognize examples of using input and output sanitization as a defensive coding practice
    recognize examples of using error handling as a defensive coding practice
    recognize examples of using input validation as a defensive coding practice
    recognize examples of using logging and auditing as a defensive coding practice
  • recognize examples of using session management as a defensive coding practice
    recognize examples of using exception management as a defensive coding practice
    distinguish between safe and unsafe API coding practices
    distinguish between static and dynamic type safety enforcement
    recognize characteristics of memory management as a defensive coding practice
    recognize characteristics of configuration parameter management as a defensive coding practice
    recognize examples of tokenizing as a defensive coding practice
    recognize characteristics of sandboxing as a defensive coding practice
    summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE