CSSLP: Secure Software Concepts


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
A fundamental understanding of the potential risks, vulnerabilities and exposures throughout the software lifecycle is the basis for ensuring overall software security. In this course, you'll learn about the core concepts of confidentiality, integrity, authentication, and authorization. You'll also be introduced to security design principles such as least privilege, separation of duties, fail safe, and economy of mechanism. Finally, this course covers best practices for governance, risk, and compliance throughout the software lifecycle. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Secure Software Lifecycle Professional (CSSLP) exam.

Target Audience
Individuals interested in secure software lifecycle design concepts and methodologies; candidates for the Certified Secure Software Lifecycle Professional (CSSLP) exam

Prerequisites
None

Expected Duration (hours)
2.2

Lesson Objectives

CSSLP: Secure Software Concepts

  • start the course
  • recognize the characteristics of confidentiality
  • identify the characteristics of integrity
  • identify the characteristics of availability
  • recognize the characteristics of authentication and authorization
  • recognize the characteristics of authentication and authorization
  • identify the role of accounting in assuring security
  • recognize the characteristics of non-repudiation
  • identify the characteristics of least privilege
  • recognize the characteristics of separation of duties
  • recognize the characteristics of defense in depth
  • recognize the characteristics of fail-safe
  • recognize the characteristics of economy of mechanism
  • recognize the characteristics of complete mediation
  • recognize the characteristics of open design
  • recognize the characteristics of least common mechanism
  • recognize the characteristics of psychological acceptability
  • recognize the characteristics of the weakest link
  • recognize the characteristics of leveraging existing components
  • recognize the characteristics of privacy
  • distinguish between different privacy considerations
  • recognize characteristics of regulations and compliance
  • distinguish between legal issues to keep in mind during the software lifecycle
  • recognize characteristics of standards
  • distinguish between the steps of the general risk management model
  • identify secure software concepts in the Waterfall methodology
  • identify secure software concepts in the Agile methodology
  • recognize the principles and practices behind securing software
  • Course Number:
    sp_slcp_a01_it_enus

    Expertise Level
    Intermediate