Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk & Modeling
CSSLP 2019
| Intermediate
- 9 videos | 30m 29s
- Includes Assessment
- Earns a Badge
This course explores the use of architectural risk assessment to identify flaws in software, and to determine risks. You will learn to use security management interfaces, and how to design and integrate the interfacing security functionality with existing software to meet an enterprise's security objectives. This 9-video course will examine upstream/downstream software development and compatibility, the types of design decisions when encountering interconnectivity with other applications, and any considerations concerning key sharing, single sign-on, token-based security, and delegation of trust. You will learn the two types of channels, message passing and shared memory channels, for communication between two entities. Next, learn how to do a proper architectural risk analysis by using vulnerability analysis, ambiguity analysis, and platform vulnerability analysis. Learners then use an engineering goal-oriented model to evaluate security, and learn how to use an NFR (nonfunctional requirements) framework. Finally, the course examines data classification. This course can be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how to model typical threats, including advanced persistent threats, insider threats, common malware, and third-party/supplierDescribe secure interface design for security management interfaces, out-of-band management, and log interfacesDescribe upstream and downstream dependencies such as key and data sharing between appsDescribe protocol design choices such as apis, weaknesses, state, and models
-
Identify common architecture frameworksModel non-functional security properties and constraintsModel and classify dataSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 38s
-
4m 14sUpon completion of this video, you will be able to recognize how to model typical threats, including advanced persistent threats, insider threats, common malware, and third-party/supplier threats. FREE ACCESS
-
3m 30sAfter completing this video, you will be able to describe secure interface design for security management interfaces, out-of-band management, and log interfaces. FREE ACCESS
-
3m 43sAfter completing this video, you will be able to describe upstream and downstream dependencies, such as key and data sharing between apps. FREE ACCESS
-
2m 40sUpon completion of this video, you will be able to describe protocol design choices such as APIs, weaknesses, state, and models. FREE ACCESS
-
7m 38sIn this video, you will learn how to identify common architecture frameworks. FREE ACCESS
-
1m 59sIn this video, you will learn how to model non-functional security properties and constraints. FREE ACCESS
-
3m 58sFind out how to model and classify data. FREE ACCESS
-
1m 10s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.