Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs
CSSLP 2019
| Intermediate
- 6 videos | 15m 59s
- Includes Assessment
- Earns a Badge
This 6-video course explores numerous concepts important in developing secure software requirements. First, learn the purpose of use cases which is a powerful graphical technique for mapping out the functional requirements of a system, and how they can be designed for both developers and testers. The course then explores misuse/abuse cases to examine prohibited activities or a typical attack, and demonstrates an attack through specific misuse case scenarios. Learners examine the benefits of a traceability matrix, a table structure used for documenting and managing requirements, and learn to track implementation details and specifics. This course explores aspects of secure software, and reliable attributes common to all secure software. You will learn that in recovering data, secure software must be predictable and designed to limit damage. Then examine the importance of gathering of security requirements while gathering software requirements. Finally, you will learn how confidentiality requirements detail the ways in which a system must protect against unauthorized disclosure. This course may be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe how use cases model the intended behavior of the software or systemDescribe when to use misuse/abuse cases
-
List the benefits of rtm for software developmentList software requirement specifications such as confidentiality, integrity, availability, authentication, authorization, and accountabilitySummarize the key concepts covered in this course
IN THIS COURSE
-
1m 40s
-
3m 18sUpon completion of this video, you will be able to describe how to use cases model the intended behavior of the software or system. FREE ACCESS
-
1m 58sAfter completing this video, you will be able to describe when to use abuse cases. FREE ACCESS
-
3m 37sAfter completing this video, you will be able to list the benefits of RTM for software development. FREE ACCESS
-
4m 12sUpon completion of this video, you will be able to list software requirement specifications such as confidentiality, integrity, availability, authentication, authorization, and accountability. FREE ACCESS
-
1m 14s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.