CSSLP 2024: Secure Software Supply Chain
CSSLP 2024
| Expert
- 7 videos | 43m 30s
- Includes Assessment
- Earns a Badge
Software supply chain security is more important than ever, particularly due to the rise in popularity of Python. Domain 8 of the CSSLP, the Secure Software Supply Chain, equips you to deal with security controls, externally sourced components, vendors, and software acquisition. First, you'll learn how to assess established frameworks such as Cybersecurity Supply Chain Risk Management (C-SCRM), OWASP Software Component Verification Standard (SCVS), and the Cloud Controls Matrix (CCM). Then, you'll move on to the concepts of pedigree, which documents ownership and transfer through the software supply chain. Next, you'll focus on software acquisition, conducting due diligence on vendors, and ensuring compliance with industry regulations. Then, you'll contrast the sale and licensing of software, comparing different types of licenses such as proprietary and open-source. Finally, you'll examine important contractual elements, including liability clauses, Master Agreements, and End User License Agreements (EULAs), enabling you to manage legal and contractual risks effectively. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseUtilize the c-scrm framework, owasp scvs and cloud controls matrix to frame security assessments of the software supply chainIdentify pedigree as the detailed history and lineage and provenance as the documented ownership and transfer of software components in the software supply chainOutline steps, security controls, and considerations for a sound software acquisition process
-
Contrast the sale and licensing of software and enumerate types of software licensesAnalyze important liability clauses and contextualize master agreements and end user licensing agreementsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 55sIn this video, you will discover the key concepts covered in this course. FREE ACCESS
-
11m 26sLearn how to utilize the C-SCRM framework, OWASP SCVS and Cloud Controls Matrix to frame security assessments of the software supply chain. FREE ACCESS
-
7m 4sFind out how to identify pedigree as the detailed history and lineage and provenance as the documented ownership and transfer of software components in the software supply chain. FREE ACCESS
-
7m 22sIn this video, you will learn how to outline steps, security controls, and considerations for a sound software acquisition process. FREE ACCESS
-
9m 21sDuring this video, you will learn how to contrast the sale and licensing of software and enumerate types of software licenses. FREE ACCESS
-
4m 28sDiscover how to analyze important liability clauses and contextualize Master Agreements and End User Licensing Agreements. FREE ACCESS
-
1m 54sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.