CSSLP 2024: Secure Software Implementation

CSSLP 2024    |    Expert
  • 11 videos | 1h 24m 57s
  • Includes Assessment
  • Earns a Badge
Domain 5, Secure Software Implementation, is a dense, interesting domain of the CSSLP certification where you encounter fascinating code samples from different languages. This course is designed to ensure the test-taker can apply security practices to each phase of the software development life cycle. First, you'll analyze the differences between imperative and declarative programming, explore processor security extensions, and study input validation and output sanitization best practices to prevent common attacks. Then, you'll learn SEI CERT secure coding practices in Java, C, C++, and Android, with examples from ten coding guidelines in each language. You'll explore secure session management techniques in PHP, Python, and Java, covering session expiration, secure cookie handling, and session ID regeneration. Additionally, you'll study concurrency exploits such as race conditions and TOCTOU attacks. Finally, you'll analyze concurrency best practices in Python, Java, C#, and C++, learning how to use threads, locks, and safe collections, along with database concurrency best practices and isolation levels to prevent issues like dirty reads. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Analyze imperative vs. declarative programming and processor security extensions
    Enumerate practices for input validation and output sanitization
    Define sei cert secure practices and analyze examples related to java and access modifiers
    Analyze secure coding practices for c, c++, and android, as well as the sei cert top 10
    Analyze secure session management practices in php, python, and java
  • Outline race conditions, deadlocks, resource exhaustion, toctou attacks, and other synchronization issues
    Analyze the use of threads, thread pools, queues, and futures in python
    Outline language-specific use of locks, threads, mutexes, safe collections and monitors in c++, c#, and java
    Define and enumerate isolation levels and database concurrency best practices
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 1s
    In this video, you will discover the key concepts covered in this course. FREE ACCESS
  • 7m 16s
    Learn how to analyze imperative vs. declarative programming and processor security extensions. FREE ACCESS
  • Locked
    3.  Input Validation and Output Sanitization
    5m 4s
    In this video, find out how to enumerate practices for input validation and output sanitization. FREE ACCESS
  • Locked
    4.  SEI CERT Secure Practices
    10m 21s
    During this video, you will learn how to define SEI CERT secure practices and analyze examples related to Java and access modifiers. FREE ACCESS
  • Locked
    5.  SEI CERT for C, C++, and Android
    9m 18s
    In this video, find out how to analyze secure coding practices for C, C++, and Android, as well as the SEI CERT Top 10. FREE ACCESS
  • Locked
    6.  Secure Session Management in PHP, Python, and Java
    10m 12s
    In this video, learn how to analyze secure session management practices in PHP, Python, and Java. FREE ACCESS
  • Locked
    7.  Concurrency and Threading Exploits
    6m 42s
    Learn how to outline race conditions, deadlocks, resource exhaustion, TOCTOU attacks, and other synchronization issues. FREE ACCESS
  • Locked
    8.  Concurrency Best Practices in Python
    8m 34s
    During this video, you will learn how to analyze the use of threads, thread pools, queues, and futures in Python. FREE ACCESS
  • Locked
    9.  Concurrency Best Practices in Java, C#, and C++
    11m 23s
    Find out how to outline language-specific use of locks, threads, mutexes, safe collections and monitors in C++, C#, and Java. FREE ACCESS
  • Locked
    10.  Database Concurrency Exploits and Best Practices
    11m 51s
    Upon completion of this video, you will be able to define and enumerate isolation levels and database concurrency best practices. FREE ACCESS
  • Locked
    11.  Course Summary
    2m 16s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 3.6 of 5 users Rating 3.6 of 5 users (5)