CSSLP 2024: Secure Software Lifecycle Management
CSSLP 2024
| Expert
- 11 videos | 1h 32m 19s
- Includes Assessment
- Earns a Badge
Security design principles enable professionals to create resilient software systems, protect sensitive data, and ensure compliance with industry standards, enhancing overall cybersecurity and professional credibility. In this course, you will explore the differences between predictive and adaptive software development life cycle (SDLC) approaches. You will contrast the Agile methodology with the Waterfall approach and secure implementations of Agile methodologies, such as Secure Scrum and Microsoft Security Development Lifecycle (MSDL)/Agile. Then you will trace the evolution of DevOps from Agile and examine how DevSecOps embeds security practices into the workflow, ensuring shared responsibility for security. Next, you will discover DevSecOps security practices, including automated security testing and continuous monitoring. Finally, you will analyze the importance of inventory management, secure configuration management, and security standard adoption. The course will also cover the Center for Internet Security (CIS) benchmarks for actionable security guidelines, the Security Technical Implementation Guide (STIG) for U.S. Department of Defense compliance, and Security Content Automation Protocol (SCAP) for automating security assessments and policy enforcement. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine secure software lifecycle management and contrast predictive and adaptive software development life cycle (sdlc) approachesProvide an overview of secure lifecycle management in the waterfall sdlc approachContrast agile with waterfall and enumerate implementations and terms related to agileOutline secure implementations of agile methodologies such as secure scrum and microsoft security development lifecycle (msdl)/agileTrace the evolution of devops and analyze its characteristics
-
Provide an overview of security practices in devsecopsDescribe the importance of inventory management and secure configuration management before the adoption of security standardsAnalyze the center for internet security (cis) benchmarks, the security technical implementation guide (stig) for working with the us department of defense (dod), and security content automation protocol (scap) for automationAnalyze the use cases of the common criteria (iso/iec 15408), federal information processing standards (fips), and common vulnerability scoring system (cvss)Summarize the key concepts covered in this course
IN THIS COURSE
-
2m 2sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
11m 2sAfter completing this video, you will be able to define secure software lifecycle management and contrast predictive and adaptive software development life cycle (SDLC) approaches. FREE ACCESS
-
12m 34sUpon completion of this video, you will be able to provide an overview of secure lifecycle management in the Waterfall SDLC approach. FREE ACCESS
-
9m 7sAfter completing this video, you will be able to contrast Agile with Waterfall and enumerate implementations and terms related to Agile. FREE ACCESS
-
9m 46sUpon completion of this video, you will be able to outline secure implementations of Agile methodologies such as Secure Scrum and Microsoft Security Development Lifecycle (MSDL)/Agile. FREE ACCESS
-
8m 40sAfter completing this video, you will be able to trace the evolution of DevOps and analyze its characteristics. FREE ACCESS
-
5m 51sUpon completion of this video, you will be able to provide an overview of security practices in DevSecOps. FREE ACCESS
-
10m 7sAfter completing this video, you will be able to describe the importance of inventory management and secure configuration management before the adoption of security standards. FREE ACCESS
-
11m 34sUpon completion of this video, you will be able to analyze the Center for Internet Security (CIS) benchmarks, the Security Technical Implementation Guide (STIG) for working with the US Department of Defense (DoD), and Security Content Automation Protocol (SCAP) for automation. FREE ACCESS
-
9m 16sAfter completing this video, you will be able to analyze the use cases of the Common Criteria (ISO/IEC 15408), Federal Information Processing Standards (FIPS), and Common Vulnerability Scoring System (CVSS). FREE ACCESS
-
2m 20sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.