CSSLP 2024: Secure Software Requirements
CSSLP 2024
| Expert
- 12 videos | 1h 32m 35s
- Includes Assessment
- Earns a Badge
The Secure Software Requirements CSSLP domain spans a wide range of topics, from privacy regulations to the construction of the Security Requirements Traceability Matrix (SRTM). In this course, you'll learn to distinguish between functional and non-functional security requirements, gather security requirements across business, application, and infrastructure layers, define user requirements, and create effective user stories using the INVEST attributes. Next, explore key compliance requirements and relevant regulations, including GDPR, CCPA, HIPAA, and Sarbanes-Oxley, analyze security requirements from NIST and ISO/IEC publications, and discover how these standards help organizations maintain strong security postures. You'll learn about the principles of data governance and data classification, including how to categorize data with labels like Confidential, Internal, and Public. Finally, you'll explore the data lifecycle, covering the stages of data creation, storage, usage, retention, and disposal, with a focus on secure practices. You will also study key confidentiality models like Bell-LaPadula and Brewer-Nash, as well as integrity models like Biba and Clark-Wilson. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify types of functional security requirements and non-functional security requirementsAnalyze security requirements gathering in the context of the three-tier model, and describe the owasp asvsDefine user requirements, user tasks, user stories, use case scenarios and the invest attributesDefine gdpr, ccpa, hipaa and other regulations and analyze compliance requirements in sarbanes oxleyOutline security requirements in various nist and iso/iec publications with examples
-
Define data governance and data classification and enumerate common tools and labels in data classificationAnalyze the roles of data subject, owner, controller, custodian, processor, and userDefine structured, semi-structured, and unstructured dataDefine the data lifecycle and outline considerations in secure data retention, retrieval, and disposalDescribe confidentiality models such as bell-lapadula and brewer-nash, as well as integrity models such as biba and clark-wilsonSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 22sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 36sFind out how to identify types of functional security requirements and non-functional security requirements. FREE ACCESS
-
4m 50sUpon completion of this video, you will be able to analyze security requirements gathering in the context of the three-tier model, and describe the OWASP ASVS. FREE ACCESS
-
9m 24sAfter completing this video, you will be able to define user requirements, user tasks, user stories, use case scenarios and the INVEST attributes. FREE ACCESS
-
9m 23sLearn how to define GDPR, CCPA, HIPAA and other regulations and analyze compliance requirements in Sarbanes Oxley. FREE ACCESS
-
10m 57sLearn how to outline security requirements in various NIST and ISO/IEC publications with examples. FREE ACCESS
-
7m 22sDuring this video, discover how to define data governance and data classification and enumerate common tools and labels in data classification. FREE ACCESS
-
12m 9sDuring this video, you will learn how to analyze the roles of data subject, owner, controller, custodian, processor, and user. FREE ACCESS
-
10m 7sFind out how to define structured, semi-structured, and unstructured data. FREE ACCESS
-
5m 48sDuring this video, discover how to define the data lifecycle and outline considerations in secure data retention, retrieval, and disposal. FREE ACCESS
-
7m 43sUpon completion of this video, you will be able to describe confidentiality models such as Bell-LaPadula and Brewer-Nash, as well as integrity models such as Biba and Clark-Wilson. FREE ACCESS
-
2m 55sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.