Certified Secure Software Lifecycle Professional (CSSLP) 2019: Governance, Risk, and Compliance

CSSLP 2019    |    Intermediate
  • 10 videos | 36m 56s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 165 users Rating 4.5 of 165 users (165)
This 10-video course explores regulations and compliance considerations as they relate to governance, risk, and compliance (GRC). First, learners will identify legal factors, such as intellectual property and breach notifications, and learn about General Data Protection Regulations (GDPR), for which violations can result in significant financial penalties. Next, learn about standards and guidelines, including those from the International Organization for Standardization (ISO), the Payment Card Industry Data Security Standard, the National Institute for Standards and Technology (NIST), the Open Web Application Security Project (OWASP), the Software Assurance Forum for Excellence in Code, the Software Assurance Maturity Model, and Building Security In Maturity Model. You will then hear discussions of risk management and risk response. Explore common terminology, including threats, vulnerability, residual risk, controls, probability, and impact. Learn to differentiate between technical risk and business risk. The course concludes by exploring productive strategies, including mitigate, accept, transfer, and avoid. The course prepares learners for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • Identify the objectives of the course
    Recognize regulations and compliance considerations as they relate to the governance, risk, and compliance
    Identify legal factors such as intellectual property and breach notification
    List standards and guidelines including iso, pci, nist, owasp, safecode, opensamm, bsimm
    Describe risk management
  • Describe risk response
    Describe common terminology including threats, vulnerability, residual risk, controls, probability, and impact
    Differentiate between technical risk and business risk
    Describe strategies including mitigate, accept, transfer, and avoid
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 11s
  • 3m 34s
    Upon completion of this video, you will be able to recognize regulations and compliance considerations as they relate to governance, risk, and compliance. FREE ACCESS
  • Locked
    3.  Legal Factors
    1m 54s
    In this video, learn how to identify legal factors such as intellectual property and breach notification. FREE ACCESS
  • Locked
    4.  Standards and Guidelines
    7m 11s
    Upon completion of this video, you will be able to list standards and guidelines including ISO, PCI, NIST, OWASP, SAFECode, OpenSAMM, and BSIMM. FREE ACCESS
  • Locked
    5.  Risk Management
    6m 57s
    Upon completion of this video, you will be able to describe risk management. FREE ACCESS
  • Locked
    6.  Risk Response
    4m 36s
    After completing this video, you will be able to describe risk response strategies. FREE ACCESS
  • Locked
    7.  Terminology
    3m 29s
    After completing this video, you will be able to describe common terminology including threats, vulnerabilities, residual risks, controls, probability, and impact. FREE ACCESS
  • Locked
    8.  Technical Risk vs. Business Risk
    2m 17s
    Find out how to differentiate between technical risk and business risk. FREE ACCESS
  • Locked
    9.  Strategies
    3m 22s
    After completing this video, you will be able to describe strategies including mitigation, acceptance, transfer, and avoidance. FREE ACCESS
  • Locked
    10.  Course Summary
    1m 26s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 64 users Rating 4.7 of 64 users (64)
Rating 4.9 of 7 users Rating 4.9 of 7 users (7)
Rating 4.5 of 85 users Rating 4.5 of 85 users (85)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 2479 users Rating 4.4 of 2479 users (2479)
Rating 4.2 of 107 users Rating 4.2 of 107 users (107)
Rating 4.4 of 773 users Rating 4.4 of 773 users (773)