Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Lifecycle Management

CSSLP 2019    |    Intermediate
  • 15 videos | 48m 11s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 98 users Rating 4.4 of 98 users (98)
Explore how to use the secure lifecycle management model in this 15-video course. First, learners will hear practical descriptions of secure configurations, inversion control, how to obtain security milestones, and secure software methodology. Then receive an overview of security standards and frameworks, and explore configuration management as it relates to source code version control. Next, the course discusses how to prepare proper security documentation, provides an overview of a security matrix, and describes end-of-life policies. Learners will then watch demonstrations of how to perform data destruction and how to perform credential removal. You will learn about concepts such as security metrics and governance, risk, and compliance (GRC). The course concludes with useful discussions of what acceptance is, including software qualification testing, planning hierarchy, what the characteristics of the pre-release testing process are, and the characteristics of a post-release plan; and how and when to report security status. The course prepares learners for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • Identify the objectives of the course
    Describe secure configurations and version control
    Recognize how to establish security milestones
    Recognize the secure software methodology
    Describe security standards and frameworks
    Recognize how to prepare proper security documentation
    Recognize security metrics
    Describe end-of-life policies
  • Recognize how data are destroyed
    Recognize how to perform credential removal
    Recognize acceptance include software qualification testing, planning, and hierarchy
    Identify the characteristics of the pre-release testing process
    Identify characteristics of a post-release plan
    Recognize how to report security status
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 50s
  • 2m 26s
    Upon completion of this video, you will be able to describe secure configurations and version control. FREE ACCESS
  • Locked
    3.  Security Milestones
    1m 28s
    After completing this video, you will be able to recognize how to establish security milestones. FREE ACCESS
  • Locked
    4.  Secure Software Methodology
    4m 6s
    After completing this video, you will be able to recognize the secure software development methodology. FREE ACCESS
  • Locked
    5.  Security Standards and Frameworks
    5m 12s
    Upon completion of this video, you will be able to describe security standards and frameworks. FREE ACCESS
  • Locked
    6.  Security Documentation
    4m 22s
    Upon completion of this video, you will be able to recognize how to prepare proper security documentation. FREE ACCESS
  • Locked
    7.  Security Metrics
    2m 18s
    Upon completion of this video, you will be able to recognize security metrics. FREE ACCESS
  • Locked
    8.  End-of-life policies
    4m 5s
    After completing this video, you will be able to describe end-of-life policies. FREE ACCESS
  • Locked
    9.  Data Destruction
    3m 40s
    After completing this video, you will be able to recognize how data is destroyed. FREE ACCESS
  • Locked
    10.  Credential Removal
    2m 3s
    Upon completion of this video, you will be able to recognize how to remove credentials. FREE ACCESS
  • Locked
    11.  Acceptance
    5m 52s
    Upon completion of this video, you will be able to recognize that acceptance includes software qualification testing, planning, and hierarchy. FREE ACCESS
  • Locked
    12.  Pre-release Activities
    3m 45s
    In this video, find out how to identify the characteristics of the pre-release testing process. FREE ACCESS
  • Locked
    13.  Post-release Activities
    2m 7s
    In this video, learn how to identify characteristics of a post-release plan. FREE ACCESS
  • Locked
    14.  Security Status
    3m 33s
    After completing this video, you will be able to recognize how to report security status. FREE ACCESS
  • Locked
    15.  Course Summary
    1m 24s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 280 users Rating 4.5 of 280 users (280)
Rating 4.6 of 498 users Rating 4.6 of 498 users (498)
Rating 4.4 of 38 users Rating 4.4 of 38 users (38)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 85 users Rating 4.5 of 85 users (85)
Rating 4.4 of 44 users Rating 4.4 of 44 users (44)