Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Vulnerabilities
CSSLP 2019
| Intermediate
- 20 videos | 1h 21m 20s
- Includes Assessment
- Earns a Badge
Explore how to identify and assess security vulnerabilities in this 20-video course, in which you will encounter essential secure coding techniques such as versioning, peer-based code reviews, code analysis, and anti-tampering techniques. First, become familiar with malicious practices and the threats outlined in the Open Web Application Security Project (OWASP) Top 10 list and the Common Weakness Enumeration (CWE) list of software weaknesses. You will soon be able to differentiate between CWE and Common Vulnerabilities and Exposure (CVE) lists. Next, learn to describe the characteristics of injection attacks, before watching demonstrations of input validation failures such as buffer overflows, canonical form, missing defense functions, and general programming failures. You will examine how to analyze reuse code for security vulnerabilities, identify malicious code, securely reuse third-party code, and securely integrate components. Finally, learners will hear discussions of defensive coding, side channels, social engineering attacks, source code and versioning. The course prepares learners for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseLocate and list the owasp "top 10"Locate and list the cwe list of software weaknessesDescribe characteristics of injection attacksRecognize input validation failures such as buffer overflow, canonical, missing defense functions, and general programming failuresDifferentiate between common weakness enumerations and common vulnerabilities and exposureDescribe side channelsDescribe social engineering attacks such as phishingIdentify source code and versioning best practicesIdentify build environment best practices such as anti-tampering techniques and compiler switches
-
Recognize characteristics of peer-based code reviewsDistinguish between static and dynamic code analysisList the steps for code signingAnalyze reused code for security vulnerabilitiesDifferentiate between static and dynamic analysisSearch for and identify malicious codeSecurely reuse third party code or librariesRecognize how to securely integrate components such as systems of systems integrationDebug security errorsSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 24s
-
7m 1sIn this video, you will locate and list the OWASP "Top 10". FREE ACCESS
-
3mDuring this video, you will learn how to locate and list the Common Weakness Enumeration (CWE) list of software weaknesses. FREE ACCESS
-
9m 6sAfter completing this video, you will be able to describe characteristics of injection attacks. FREE ACCESS
-
7m 16sUpon completion of this video, you will be able to recognize input validation failures such as buffer overflow, canonicalization, missing defense functions, and general programming failures. FREE ACCESS
-
4m 32sIn this video, find out how to differentiate between common weakness enumerations and common vulnerabilities and exposures. FREE ACCESS
-
2m 9sAfter completing this video, you will be able to describe side channels. FREE ACCESS
-
5m 24sUpon completion of this video, you will be able to describe social engineering attacks, such as phishing. FREE ACCESS
-
4m 34sIn this video, you will learn how to identify source code and versioning best practices. FREE ACCESS
-
3m 32sIn this video, you will identify build environment best practices, such as anti-tampering techniques and compiler switches. FREE ACCESS
-
3m 59sUpon completion of this video, you will be able to recognize characteristics of code reviews based on peers. FREE ACCESS
-
2m 39sIn this video, learn how to distinguish between static and dynamic code analysis. FREE ACCESS
-
5m 1sUpon completion of this video, you will be able to list the steps for code signing. FREE ACCESS
-
2m 19sIn this video, you will learn how to analyze code that has been reused for security vulnerabilities. FREE ACCESS
-
5m 26sDuring this video, you will learn how to differentiate between static and dynamic analysis. FREE ACCESS
-
2m 27sIn this video, you will learn how to search for and identify malicious code. FREE ACCESS
-
1m 55sIn this video, you will learn how to securely reuse third-party code or libraries. FREE ACCESS
-
1m 57sAfter completing this video, you will be able to recognize how to securely integrate components such as systems of systems integration. FREE ACCESS
-
4m 56sIn this video, find out how to fix security errors. FREE ACCESS
-
1m 42s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.