5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Internet and Network Technologies Solution Area     Security Solutions     Certified Secure Software Lifecycle Professional (CSSLP) 2019

This course examines information needed to earn the (ISC)2 CSSLP (Certified Secure Software Lifecycle Professional) certification and to prepare for the CSSLP exam. These security professionals are well versed in how to incorporate key security practices into all lifecycle stages of software development. This course covers secure software concepts such as covert, overt, and encryption. You will examine the secure software concepts of confidentiality, integrity, and availability (collectively, CIA) and examine concepts that support the concepts, such as authentication, authorization, accountability, and non-repudiation. Learn the difference between various integrity concepts such as hashing, digital signatures, code signing, reliability, alterations, and authenticity. You will also learn about authentication concepts, such as multifactor authentication, identity and access management, single sign-on, and federated identity management. Learn when to use different authorization concepts, such as access controls and entitlements. Finally, the course covers accountability concepts, such as auditing and logging, and describe non-repudiation concepts, such as public key infrastructure (PKI) and digital signatures.



Objectives

Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts

  • discover the key concepts covered in this course
  • recognize confidentiality concepts such as covert, overt, and encryption
  • differentiate between different integrity concepts such as hashing, digital signatures, code signing, reliability, alterations, and authenticity
  • describe different availability concepts such as failover, replication, clustering, scalability, and resiliency
  • recognize available authentication concepts such as multifactor authentication, identity and access management, single sign-on, and federated identity
  • differentiate between authorization concepts such as access controls and entitlements
  • list accountability concepts such as auditing and logging
  • describe non-repudiation concepts such as PKI and digital signatures
  • summarize the key concepts covered in this course