Certified Secure Software Lifecycle Professional (CSSLP)
Kurs
In Utrecht (Niederlande)
Beschreibung
-
Kursart
Kurs
-
Niveau
Fortgeschritten
-
Ort
Utrecht (Niederlande)
-
Unterrichtsstunden
40h
-
Dauer
5 Tage
Learn to develop, manage and maintain software security
Some 80% of all security breaches are application-related. Application security must therefore be a priority to organizations to protect their business and reputation. According to several studies, application vulnerabilities are ranked the number 1 threat to cybersecurity professionals. It is crucial that anyone involved in the Software Development Lifecycle (SDLC) is knowledgeable and experienced in understanding how to build secure software. In this 5-day training you will be prepared for the international Certified Secure Software Lifecycle Professional (CSSLP) title of (ISC)2.
Globally recognized proficiency in application security with CSSLP
This 5-day Certified Secure Software Lifecycle Professional (CSSLP) training provides you with the expertise to incorporate security practices - authentication, authorization and auditing - into each phase of the SDLC, from software design and implementation to testing and deployment. The CSSLP training will ensure that you have a deep knowledge and understanding of how to build secure software.
Certified Secure Software Lifecycle Professional (CSSLP) – why should you become certified?
In today's interconnected world, security must be included within each phase of the sofware lifecycle. The Certified Secure Software Lifecycle Professional (CSSLP) Common Body of Knowledge (CBK) contains the largest, most comprehensive collection of best practices, policies, and procedures to ensure a security initiative across all phases of application development, regardless of methodology. Many organizations have already adopted CSSLP as the preferred credential to convey one's expertise in security on the software development lifecycle.
Standorte und Zeitplan
Lage
Beginn
Beginn
Hinweise zu diesem Kurs
This 5-day training provides a comprehensive review of applications, security concepts and best practices, covering the 8 domains of the CSSLP CBK. The CSSLP training will help you:
validate your expertise in application security
conquer application vulnerabilities offering more value to your employer
demonstrate a working knowledge of application security
differentiate and enhance your credibility and marketability on a worldwide scale
break the penetrate and patch test approach
reduce production cost, vulnerabilities and delivery days
enhance the credibility of your organization and the development team
reduce loss of revenue and reputation due to a breach resulting from insecure software
Ensure compliance with government or industry regulations
Each software lifecycle stakeholder is responsible for a certain phase of the SDLC, but all phases must have security built into them. Certified Secure Software Lifecycle Professional (CSSLP) is intended for all stakeholders involved in the process of developing software. Each of the CSSLP domains covers how to build security into the different phases of the lifecycle.
The CSSLP training and certification are therefore meant for all stakeholders within the software lifecycle, like IT managers, security managers, project managers, auditors and software professionals such as software architects, software engineers, application security specialists, software program managers, business analysts, quality assurance testers, penetration testers and software procurement analysts.
Meinungen
Themen
- Software
- Privacy
- Ict
- Secure Network
- Professional
- Csslp
- IMF
- International
- Authentication
- Authorization
Dozenten
IMF Academy (IMF)
IT, Information Technology, Finance, Project Management, Security, Tax
IMF is an independent publisher of distance learning courses and organizer of hot topical classroom based trainings and in-company trainings. Should you have questions of suggestions, please contact us at +31 40 246 02 20 or info@imfacademy.com
Inhalte
DOMAIN I
SECURE SOFTWARE CONCEPTS
Understand secure software concepts, methodologies, and implementation within centralized and decentralized environments across the enterprise's computer systems.
- Core Concepts
- Security Design Principles
DOMAIN II
SECURE SOFTWARE REQUIREMENTS
Understand the security controls required during the requirements gathering phase of the Secure Software Development Lifecycle.
- Identify internal and external security requirements
- Interpret data classification requirements
- Identify privacy requirements
- Develop misuse and abuse cases
- Include security in software requirement specifications
- Develop security requirement traceability matrix
DOMAIN III
SECURE SOFTWARE DESIGN
Understand the techniques of performing attack surface analysis and conducting threat modeling, as well as being able to identify and review the countermeasures that mitigate risk.
- Perform threat modeling
- Define the security architecture
- Performing secure interface design
- Performing architectural risk assesment
- Modeling (non-functional) security properties and constraints
- Model and classify data
- Evaluate and select reusable secure design
- Perform design security review
- Design secure assembly architecture for component-based systems
- Use security enhancing architecture and design tools
- Use secure design principles and patterns
DOMAIN IV
SECURE LIFECYCLE MANAGEMENT
Learn about unit testing for security functionality and resiliency to attack, and developing secure code and exploit mitigation.
- Follow secure coding practices
- Analyze code for security vulnerabilities
- Implement security controls
- Fix security vulnerabilities
- Look for malicious code
- Securely reuse third party code or libraries
- Securely integrate components
- Apply security during the build process
- Debug security errors
- Perform design security review
- Design secure assembly architecture for component-based systems
- Use security enhancing architecture and design tools
- Use secure design principles and patterns
DOMAIN V
SECURE SOFTWARE TESTING
Know the standards for software quality assurance, and understand the concepts of functional and security testing, interoperability testing, bug tracking and testing of high priority code.
- Develop security test cases
- Develop security testing strategy and plan
- Identify undocumented functionality
- Interpret security implications of test results
- Classify and track security errors
- Secure test data
- Develop or obtain security test data
- Perform verification and validation testing
DOMAIN VI
SOFTWARE LIFECYCLE MANAGEMENT
Know the methods for determining completion criteria, risk acceptance and documentation (e.g., DRP and BCP), common criteria and methods of independent testing.
- Secure configuration and version control
- Establish security milestones
- Choose a secure software methodology
- Identify security standards and frameworks
- Create security documentation
- Develop security metrics
- Decommission software
- Report security status
- Support governance, risk and compliance (GRC)
DOMAIN VII
SOFTWARE DEPLOYMENT, OPERATIONS, MAINTENANCE AND DISPOSAL
Know how to evaluate reports of vulnerabilities and release security advisories and updates when appropriate. Know how to conduct a post-mortem of reported vulnerabilities and take action as necessary, be familiar with procedures and security measures when a product reaches its end of life.
- Perform implementation risk analysis
- Release software securely
- Securely store and manage security data
- Ensure secure installation
- Perform post-deployment security testing
- Obtain security approval to operate
- Perform security monitoring (e.g., managing error logs, audits, meeting SLAs, CIA metrics)
- Support incident response
- Support patch and vulnerability management
- Support continuity of operations
DOMAIN VIII
SUPPLY CHAIN AND SOFTWARE ACQUISITION
Know how to establish a process for interacting with suppliers on issues such as vulnerability management, service level agreement (SLA) monitoring, and chain of custody troughout the source code development and maintenance lifecycle.
- Analyze security of third party software
- Verify pedigree and provenance
- Provide security support to the acquisition process
Zusätzliche Informationen
Certified Secure Software Lifecycle Professional (CSSLP)
