Certified Secure Software Lifecycle Professional (CSSLP) 2019: Supply Chain & Software Acquisition
CSSLP 2019
| Intermediate
- 20 videos | 53m 54s
- Includes Assessment
- Earns a Badge
This 20-video course examines a variety of best practices for supply chain and software acquisitions. Begin by watching demonstrations of how to analyze security for a third-party software and how to verify secure transfers. Then learn the steps involved in securely interconnecting and sharing systems; how to implement code repository security; how to build environment security; and how to work with digitally-signed components. Next, explore such important topics as compliance auditing, vulnerability response and reporting, supplier sourcing challenges, contractual integrity controls, and vendor technical integrity controls. Learn the basics of how to verify pedigree and provenance. The course also covers topics such as managed services controls, service level agreements (SLAs), support structure, and software development lifecycle approaches, as well as how to secure information systems, security track records, and product deployment. Finally, you will review the configuration identification scheme, a crucial tool in configuration management. The course prepares learners for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseAnalyze security for third party softwareRecognize how to verify secure transfersDescribe how to securely interconnect and share systemsDescribe code repository securityRecognize how to secure the build environmentRecognize cryptographically hashed or digitally signed componentsRecognize how to audit security policy complianceRecognize how to perform vulnerability/incident response and reportingDistinguish between different security trade-offs in supplier sourcing
-
Identify best practices for contractual integrity controlsIdentify best practices for vendor technical integrity controlsIdentify best secure control practices for managed services from a supplierDistinguish between the two rules slas should provideRecognize maintenance and support structures such as community vs. commercialRecognize how to assess software engineering and sdlc approachesRecognize how to assess information systems security policy complianceAssess a security track recordRecognize product deployment and sustainment controls such as upgrades, secure configuration, custom code extensions, operational readiness, and gpl requirementsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 57s
-
4m 20sIn this video, learn how to analyze security for third-party software. FREE ACCESS
-
1m 19sUpon completion of this video, you will be able to recognize how to verify secure transfers. FREE ACCESS
-
2m 13sUpon completion of this video, you will be able to describe how to securely interconnect and share systems. FREE ACCESS
-
4m 5sAfter completing this video, you will be able to describe code repository security. FREE ACCESS
-
2m 45sAfter completing this video, you will be able to recognize how to secure the build environment. FREE ACCESS
-
2m 1sAfter completing this video, you will be able to recognize cryptographically hashed or digitally signed files. FREE ACCESS
-
2m 42sUpon completion of this video, you will be able to recognize how to audit security policy compliance. FREE ACCESS
-
2m 7sAfter completing this video, you will be able to recognize how to perform vulnerability and incident response and reporting. FREE ACCESS
-
4m 23sLearn how to distinguish between different security trade-offs when sourcing suppliers. FREE ACCESS
-
2m 16sFind out how to identify best practices for controls over contract integrity. FREE ACCESS
-
3m 56sIn this video, you will learn how to identify best practices for vendor technical integrity controls. FREE ACCESS
-
2m 7sFind out how to identify the best secure control practices for managed services from a supplier. FREE ACCESS
-
2m 56sDuring this video, you will learn how to distinguish between the two rules that SLAs should provide. FREE ACCESS
-
2m 18sAfter completing this video, you will be able to recognize maintenance and support structures such as community versus commercial. FREE ACCESS
-
4m 53sAfter completing this video, you will be able to assess software engineering and SDLC approaches. FREE ACCESS
-
2m 16sUpon completion of this video, you will be able to assess information systems security policy compliance. FREE ACCESS
-
1m 56sIn this video, find out how to assess a security track record. FREE ACCESS
-
1m 59sAfter completing this video, you will be able to recognize product deployment and sustainment controls such as upgrades, secure configurations, custom code extensions, operational readiness, and GPL requirements. FREE ACCESS
-
1m 23s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Course
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Software Deployment & Management
Rating 4.5 of 46 users
(46)
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Software Deployment & Management
Rating 4.5 of 46 users
(46)