Certified Secure Software Lifecycle Professional (CSSLP) 2019: Supply Chain & Software Acquisition

CSSLP 2019    |    Intermediate
  • 20 videos | 53m 54s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 78 users Rating 4.3 of 78 users (78)
This 20-video course examines a variety of best practices for supply chain and software acquisitions. Begin by watching demonstrations of how to analyze security for a third-party software and how to verify secure transfers. Then learn the steps involved in securely interconnecting and sharing systems; how to implement code repository security; how to build environment security; and how to work with digitally-signed components. Next, explore such important topics as compliance auditing, vulnerability response and reporting, supplier sourcing challenges, contractual integrity controls, and vendor technical integrity controls. Learn the basics of how to verify pedigree and provenance. The course also covers topics such as managed services controls, service level agreements (SLAs), support structure, and software development lifecycle approaches, as well as how to secure information systems, security track records, and product deployment. Finally, you will review the configuration identification scheme, a crucial tool in configuration management. The course prepares learners for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Analyze security for third party software
    Recognize how to verify secure transfers
    Describe how to securely interconnect and share systems
    Describe code repository security
    Recognize how to secure the build environment
    Recognize cryptographically hashed or digitally signed components
    Recognize how to audit security policy compliance
    Recognize how to perform vulnerability/incident response and reporting
    Distinguish between different security trade-offs in supplier sourcing
  • Identify best practices for contractual integrity controls
    Identify best practices for vendor technical integrity controls
    Identify best secure control practices for managed services from a supplier
    Distinguish between the two rules slas should provide
    Recognize maintenance and support structures such as community vs. commercial
    Recognize how to assess software engineering and sdlc approaches
    Recognize how to assess information systems security policy compliance
    Assess a security track record
    Recognize product deployment and sustainment controls such as upgrades, secure configuration, custom code extensions, operational readiness, and gpl requirements
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 57s
  • 4m 20s
    In this video, learn how to analyze security for third-party software. FREE ACCESS
  • Locked
    3.  Secure Transfers
    1m 19s
    Upon completion of this video, you will be able to recognize how to verify secure transfers. FREE ACCESS
  • Locked
    4.  Systems Sharing
    2m 13s
    Upon completion of this video, you will be able to describe how to securely interconnect and share systems. FREE ACCESS
  • Locked
    5.  Code Repository Security
    4m 5s
    After completing this video, you will be able to describe code repository security. FREE ACCESS
  • Locked
    6.  Build Environment Security
    2m 45s
    After completing this video, you will be able to recognize how to secure the build environment. FREE ACCESS
  • Locked
    7.  Digitally Signed Components
    2m 1s
    After completing this video, you will be able to recognize cryptographically hashed or digitally signed files. FREE ACCESS
  • Locked
    8.  Compliance Auditing
    2m 42s
    Upon completion of this video, you will be able to recognize how to audit security policy compliance. FREE ACCESS
  • Locked
    9.  Vulnerability Response and Reporting
    2m 7s
    After completing this video, you will be able to recognize how to perform vulnerability and incident response and reporting. FREE ACCESS
  • Locked
    10.  Supplier Sourcing Challenges
    4m 23s
    Learn how to distinguish between different security trade-offs when sourcing suppliers. FREE ACCESS
  • Locked
    11.  Contractual Integrity Controls
    2m 16s
    Find out how to identify best practices for controls over contract integrity. FREE ACCESS
  • Locked
    12.  Vendor Technical Integrity Controls
    3m 56s
    In this video, you will learn how to identify best practices for vendor technical integrity controls. FREE ACCESS
  • Locked
    13.  Managed Services Controls
    2m 7s
    Find out how to identify the best secure control practices for managed services from a supplier. FREE ACCESS
  • Locked
    14.  Service-level Agreements
    2m 56s
    During this video, you will learn how to distinguish between the two rules that SLAs should provide. FREE ACCESS
  • Locked
    15.  Support Structure
    2m 18s
    After completing this video, you will be able to recognize maintenance and support structures such as community versus commercial. FREE ACCESS
  • Locked
    16.  SDLC Approaches
    4m 53s
    After completing this video, you will be able to assess software engineering and SDLC approaches. FREE ACCESS
  • Locked
    17.  Securing Information Systems
    2m 16s
    Upon completion of this video, you will be able to assess information systems security policy compliance. FREE ACCESS
  • Locked
    18.  Security Track Record
    1m 56s
    In this video, find out how to assess a security track record. FREE ACCESS
  • Locked
    19.  Product Deployment and Configuration Management
    1m 59s
    After completing this video, you will be able to recognize product deployment and sustainment controls such as upgrades, secure configurations, custom code extensions, operational readiness, and GPL requirements. FREE ACCESS
  • Locked
    20.  Course Summary
    1m 23s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 38 users Rating 4.4 of 38 users (38)
Rating 4.6 of 147 users Rating 4.6 of 147 users (147)
Rating 4.7 of 64 users Rating 4.7 of 64 users (64)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 498 users Rating 4.6 of 498 users (498)
Rating 4.5 of 165 users Rating 4.5 of 165 users (165)
Rating 4.5 of 85 users Rating 4.5 of 85 users (85)