CISSP 2024: Assessing Software Security & Coding Guidelines

CISSP 2024    |    Expert
  • 11 videos | 27m 29s
  • Includes Assessment
  • Earns a Badge
Rating 4.9 of 7 users Rating 4.9 of 7 users (7)
It is one thing to implement application security controls, managed services, and cloud services; it is another thing to assess the ongoing success and failure of those initiatives. In the course, learn how to assess the auditing and logging of changes, risk analysis and mitigation, acquired software, managed services, and cloud services with the CCM. Next, explore source code security weaknesses and vulnerabilities at the source code level and how to secure application programming interfaces (API) with the 2023 OWASP Top 10. Finally, examine secure coding practices and software-defined security (SDS). This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how to assess auditing and logging of changes
    Identify how to assess risk analysis and mitigation
    Recognize how to assess acquired software such as commercial-off-the-shelf (cots) and modifiable off-the-shelf software (mots)
    Identify how to assess managed services like enterprise applications
    Outline how to assess cloud services, including saas, iaas, and paas
  • Describe security weaknesses and vulnerabilities at the source code level
    Recognize how to secure application programming interfaces (api)
    Outline secure coding practices
    Describe software-defined security (sds)
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 38s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 1m 48s
    After completing this video, you will be able to outline how to assess auditing and logging of changes. FREE ACCESS
  • Locked
    3.  Risk Analysis and Mitigation
    3m 37s
    Upon completion of this video, you will be able to identify how to assess risk analysis and mitigation. FREE ACCESS
  • Locked
    4.  Acquired Software
    3m 26s
    Through this video, you will recognize how to assess acquired software such as commercial-off-the-shelf (COTS) and modifiable off-the-shelf software (MOTS). FREE ACCESS
  • Locked
    5.  Managed Services
    1m 19s
    After completing this video, you will be able to identify how to assess managed services like enterprise applications. FREE ACCESS
  • Locked
    6.  Cloud Services with the CCM
    2m 19s
    In this video, we will outline how to assess cloud services, including SaaS, IaaS, and PaaS. FREE ACCESS
  • Locked
    7.  Source Code Security Weaknesses and Vulnerabilities
    3m 45s
    Upon completion of this video, you will be able to describe security weaknesses and vulnerabilities at the source code level. FREE ACCESS
  • Locked
    8.  API Security with OWASP Top 10
    4m 34s
    Through this video, you will recognize how to secure application programming interfaces (API). FREE ACCESS
  • Locked
    9.  Secure Coding Practices
    2m 39s
    After completing this video, you will be able to outline secure coding practices. FREE ACCESS
  • Locked
    10.  Software-defined Security (SDS)
    2m 53s
    Upon completion of this video, you will be able to describe software-defined security (SDS). FREE ACCESS
  • Locked
    11.  Course Summary
    33s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.9 of 23 users Rating 4.9 of 23 users (23)
Rating 4.8 of 8 users Rating 4.8 of 8 users (8)
Rating 4.5 of 133 users Rating 4.5 of 133 users (133)