Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs

CSSLP 2019    |    Intermediate
  • 6 videos | 15m 59s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 32 users Rating 4.4 of 32 users (32)
This 6-video course explores numerous concepts important in developing secure software requirements. First, learn the purpose of use cases which is a powerful graphical technique for mapping out the functional requirements of a system, and how they can be designed for both developers and testers. The course then explores misuse/abuse cases to examine prohibited activities or a typical attack, and demonstrates an attack through specific misuse case scenarios. Learners examine the benefits of a traceability matrix, a table structure used for documenting and managing requirements, and learn to track implementation details and specifics. This course explores aspects of secure software, and reliable attributes common to all secure software. You will learn that in recovering data, secure software must be predictable and designed to limit damage. Then examine the importance of gathering of security requirements while gathering software requirements. Finally, you will learn how confidentiality requirements detail the ways in which a system must protect against unauthorized disclosure. This course may be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe how use cases model the intended behavior of the software or system
    Describe when to use misuse/abuse cases
  • List the benefits of rtm for software development
    List software requirement specifications such as confidentiality, integrity, availability, authentication, authorization, and accountability
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 40s
  • 3m 18s
    Upon completion of this video, you will be able to describe how to use cases model the intended behavior of the software or system. FREE ACCESS
  • Locked
    3.  Misuse Cases
    1m 58s
    After completing this video, you will be able to describe when to use abuse cases. FREE ACCESS
  • Locked
    4.  Requirements Traceability Matrix
    3m 37s
    After completing this video, you will be able to list the benefits of RTM for software development. FREE ACCESS
  • Locked
    5.  Software Requirement Specifications
    4m 12s
    Upon completion of this video, you will be able to list software requirement specifications such as confidentiality, integrity, availability, authentication, authorization, and accountability. FREE ACCESS
  • Locked
    6.  Course Summary
    1m 14s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.4 of 281 users Rating 4.4 of 281 users (281)
Rating 4.5 of 85 users Rating 4.5 of 85 users (85)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 92 users Rating 4.8 of 92 users (92)
Rating 4.4 of 223 users Rating 4.4 of 223 users (223)
Rating 4.5 of 461 users Rating 4.5 of 461 users (461)