Certified Secure Software Lifecycle Professional (CSSLP) 2019: Software Deployment & Management

CSSLP 2019    |    Intermediate
  • 18 videos | 55m 53s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 46 users Rating 4.5 of 46 users (46)
In this 18-video course, learners can explore how to deploy and maintain software and operations. First, you will examine pre-release and post-release activities to address factors such as pre-release testing, completion criteria, risk analysis, incident response, and disaster recovery considerations. Next, examine pre-deployment and post-deployment security testing, security approval, security monitoring, incident response. Examine concepts such as secure activation, environment hardening, and disaster recovery, in which testing is critical to test software and data recoverability, often revealing problems with system availability and data accuracy and integrity. Learn to perform failover testing to ensure that the failover mechanism works as intended, and to consider simulated disasters as a strategy for testing recoverability. You will absorb the basic principles of problem and change management-a process guiding organizations when modifying software or performing upgrades or fixes on software applications-as well as patch and vulnerability management. Next, you will learn more about working with backups, archiving, and retention. The course prepares learners for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize steps to perform risk analysis
    Recognize characteristics of release management activities
    Securely store and manage configuration data
    Identify the role of bootstrapping in deployment activities
    Ensure secure installations using least privilege
    Ensure secure installations using environment hardening
    Securely store and manage security data such as credentials, secrets, keys, and configurations
    Recognize the need to perform post-deployment security testing
  • Describe how to obtain security approval to operate
    Recognize how to perform security monitoring including managing error logs, audits, meeting slas, and cia metrics
    Distinguish between incident management activities
    Recognize characteristics of problem management
    Recognize characteristics of change management
    Recognize best practices for patch and vulnerability management
    Recognize characteristics of backup, recovery, and archiving
    Recognize disaster recovery considerations as they relate to continuity of operations
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 37s
  • 3m 4s
    After completing this video, you will be able to recognize the steps to perform risk analysis. FREE ACCESS
  • Locked
    3.  Release Management
    2m 13s
    After completing this video, you will be able to recognize characteristics of release management activities. FREE ACCESS
  • Locked
    4.  Secure Configuration
    2m 19s
    During this video, you will learn how to store and manage configuration data securely. FREE ACCESS
  • Locked
    5.  Bootstrapping
    1m 51s
    Find out how to identify the role of bootstrapping in deployment activities. FREE ACCESS
  • Locked
    6.  Secure Installation
    2m 20s
    During this video, you will learn how to ensure secure installations using the principle of least privilege. FREE ACCESS
  • Locked
    7.  Environment Hardening
    4m 30s
    Learn how to ensure secure installations by hardening the environment. FREE ACCESS
  • Locked
    8.  Security Data
    4m 15s
    In this video, you will learn how to securely store and manage security data such as credentials, secrets, keys, and configurations. FREE ACCESS
  • Locked
    9.  Post-deployment Security Testing
    4m 46s
    Upon completion of this video, you will be able to recognize the need for post-deployment security testing. FREE ACCESS
  • Locked
    10.  Security Approval
    6m 18s
    After completing this video, you will be able to describe how to obtain security approval to operate. FREE ACCESS
  • Locked
    11.  Security Monitoring
    1m 42s
    Upon completion of this video, you will be able to recognize how to perform security monitoring including managing error logs, audits, meeting SLAs, and CIA metrics. FREE ACCESS
  • Locked
    12.  Incident Response
    4m 23s
    During this video, you will learn how to distinguish between incident management activities. FREE ACCESS
  • Locked
    13.  Problem Management
    2m 47s
    Upon completion of this video, you will be able to recognize characteristics of problem management. FREE ACCESS
  • Locked
    14.  Change Management
    2m 28s
    Upon completion of this video, you will be able to recognize characteristics of change management. FREE ACCESS
  • Locked
    15.  Patch and Vulnerability Management
    4m 52s
    After completing this video, you will be able to recognize best practices for patch and vulnerability management. FREE ACCESS
  • Locked
    16.  Backup, Recovery, and Archiving
    2m 49s
    After completing this video, you will be able to recognize characteristics of backup, recovery, and archiving. FREE ACCESS
  • Locked
    17.  Disaster Recovery
    2m 10s
    After completing this video, you will be able to recognize disaster recovery considerations and how they relate to continuity of operations. FREE ACCESS
  • Locked
    18.  Course Summary
    1m 28s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 64 users Rating 4.7 of 64 users (64)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.4 of 32 users Rating 4.4 of 32 users (32)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 84 users Rating 4.5 of 84 users (84)
Rating 4.3 of 55 users Rating 4.3 of 55 users (55)
Rating 4.5 of 85 users Rating 4.5 of 85 users (85)