Certified Secure Software Lifecycle Professional (CSSLP) 2019: Software Deployment & Management
CSSLP 2019
| Intermediate
- 18 videos | 55m 53s
- Includes Assessment
- Earns a Badge
In this 18-video course, learners can explore how to deploy and maintain software and operations. First, you will examine pre-release and post-release activities to address factors such as pre-release testing, completion criteria, risk analysis, incident response, and disaster recovery considerations. Next, examine pre-deployment and post-deployment security testing, security approval, security monitoring, incident response. Examine concepts such as secure activation, environment hardening, and disaster recovery, in which testing is critical to test software and data recoverability, often revealing problems with system availability and data accuracy and integrity. Learn to perform failover testing to ensure that the failover mechanism works as intended, and to consider simulated disasters as a strategy for testing recoverability. You will absorb the basic principles of problem and change management-a process guiding organizations when modifying software or performing upgrades or fixes on software applications-as well as patch and vulnerability management. Next, you will learn more about working with backups, archiving, and retention. The course prepares learners for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize steps to perform risk analysisRecognize characteristics of release management activitiesSecurely store and manage configuration dataIdentify the role of bootstrapping in deployment activitiesEnsure secure installations using least privilegeEnsure secure installations using environment hardeningSecurely store and manage security data such as credentials, secrets, keys, and configurationsRecognize the need to perform post-deployment security testing
-
Describe how to obtain security approval to operateRecognize how to perform security monitoring including managing error logs, audits, meeting slas, and cia metricsDistinguish between incident management activitiesRecognize characteristics of problem managementRecognize characteristics of change managementRecognize best practices for patch and vulnerability managementRecognize characteristics of backup, recovery, and archivingRecognize disaster recovery considerations as they relate to continuity of operationsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 37s
-
3m 4sAfter completing this video, you will be able to recognize the steps to perform risk analysis. FREE ACCESS
-
2m 13sAfter completing this video, you will be able to recognize characteristics of release management activities. FREE ACCESS
-
2m 19sDuring this video, you will learn how to store and manage configuration data securely. FREE ACCESS
-
1m 51sFind out how to identify the role of bootstrapping in deployment activities. FREE ACCESS
-
2m 20sDuring this video, you will learn how to ensure secure installations using the principle of least privilege. FREE ACCESS
-
4m 30sLearn how to ensure secure installations by hardening the environment. FREE ACCESS
-
4m 15sIn this video, you will learn how to securely store and manage security data such as credentials, secrets, keys, and configurations. FREE ACCESS
-
4m 46sUpon completion of this video, you will be able to recognize the need for post-deployment security testing. FREE ACCESS
-
6m 18sAfter completing this video, you will be able to describe how to obtain security approval to operate. FREE ACCESS
-
1m 42sUpon completion of this video, you will be able to recognize how to perform security monitoring including managing error logs, audits, meeting SLAs, and CIA metrics. FREE ACCESS
-
4m 23sDuring this video, you will learn how to distinguish between incident management activities. FREE ACCESS
-
2m 47sUpon completion of this video, you will be able to recognize characteristics of problem management. FREE ACCESS
-
2m 28sUpon completion of this video, you will be able to recognize characteristics of change management. FREE ACCESS
-
4m 52sAfter completing this video, you will be able to recognize best practices for patch and vulnerability management. FREE ACCESS
-
2m 49sAfter completing this video, you will be able to recognize characteristics of backup, recovery, and archiving. FREE ACCESS
-
2m 10sAfter completing this video, you will be able to recognize disaster recovery considerations and how they relate to continuity of operations. FREE ACCESS
-
1m 28s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.