CSSLP 2024: Secure Software Lifecycle Management

CSSLP 2024    |    Expert
  • 11 videos | 1h 32m 19s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Security design principles enable professionals to create resilient software systems, protect sensitive data, and ensure compliance with industry standards, enhancing overall cybersecurity and professional credibility. In this course, you will explore the differences between predictive and adaptive software development life cycle (SDLC) approaches. You will contrast the Agile methodology with the Waterfall approach and secure implementations of Agile methodologies, such as Secure Scrum and Microsoft Security Development Lifecycle (MSDL)/Agile. Then you will trace the evolution of DevOps from Agile and examine how DevSecOps embeds security practices into the workflow, ensuring shared responsibility for security. Next, you will discover DevSecOps security practices, including automated security testing and continuous monitoring. Finally, you will analyze the importance of inventory management, secure configuration management, and security standard adoption. The course will also cover the Center for Internet Security (CIS) benchmarks for actionable security guidelines, the Security Technical Implementation Guide (STIG) for U.S. Department of Defense compliance, and Security Content Automation Protocol (SCAP) for automating security assessments and policy enforcement. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define secure software lifecycle management and contrast predictive and adaptive software development life cycle (sdlc) approaches
    Provide an overview of secure lifecycle management in the waterfall sdlc approach
    Contrast agile with waterfall and enumerate implementations and terms related to agile
    Outline secure implementations of agile methodologies such as secure scrum and microsoft security development lifecycle (msdl)/agile
    Trace the evolution of devops and analyze its characteristics
  • Provide an overview of security practices in devsecops
    Describe the importance of inventory management and secure configuration management before the adoption of security standards
    Analyze the center for internet security (cis) benchmarks, the security technical implementation guide (stig) for working with the us department of defense (dod), and security content automation protocol (scap) for automation
    Analyze the use cases of the common criteria (iso/iec 15408), federal information processing standards (fips), and common vulnerability scoring system (cvss)
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 2s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 11m 2s
    After completing this video, you will be able to define secure software lifecycle management and contrast predictive and adaptive software development life cycle (SDLC) approaches. FREE ACCESS
  • Locked
    3.  Secure Lifecycle Management in the Waterfall Model
    12m 34s
    Upon completion of this video, you will be able to provide an overview of secure lifecycle management in the Waterfall SDLC approach. FREE ACCESS
  • Locked
    4.  The Agile Methodology
    9m 7s
    After completing this video, you will be able to contrast Agile with Waterfall and enumerate implementations and terms related to Agile. FREE ACCESS
  • Locked
    5.  Secure Scrum and MSDL/Agile
    9m 46s
    Upon completion of this video, you will be able to outline secure implementations of Agile methodologies such as Secure Scrum and Microsoft Security Development Lifecycle (MSDL)/Agile. FREE ACCESS
  • Locked
    6.  DevOps as an Extension of Agile
    8m 40s
    After completing this video, you will be able to trace the evolution of DevOps and analyze its characteristics. FREE ACCESS
  • Locked
    7.  DevSecOps for Secure Lifecycle Management
    5m 51s
    Upon completion of this video, you will be able to provide an overview of security practices in DevSecOps. FREE ACCESS
  • Locked
    8.  Inventory Management and Secure Configuration Management
    10m 7s
    After completing this video, you will be able to describe the importance of inventory management and secure configuration management before the adoption of security standards. FREE ACCESS
  • Locked
    9.  CIS Benchmarks, STIGs, and SCAP
    11m 34s
    Upon completion of this video, you will be able to analyze the Center for Internet Security (CIS) benchmarks, the Security Technical Implementation Guide (STIG) for working with the US Department of Defense (DoD), and Security Content Automation Protocol (SCAP) for automation. FREE ACCESS
  • Locked
    10.  The Common Criteria, FIPS and CVSS
    9m 16s
    After completing this video, you will be able to analyze the use cases of the Common Criteria (ISO/IEC 15408), Federal Information Processing Standards (FIPS), and Common Vulnerability Scoring System (CVSS). FREE ACCESS
  • Locked
    11.  Course Summary
    2m 20s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)