5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     (ISC)2     Certified Secure Software Lifecycle Professional (CSSLP)     Certified Secure Software Lifecycle Professional (CSSLP)

This course explores the use of architectural risk assessment to identify flaws in software, and to determine risks. You will learn to use security management interfaces, and how to design and integrate the interfacing security functionality with existing software to meet an enterprise's security objectives. This 9-video course will examine upstream/downstream software development and compatibility, the types of design decisions when encountering interconnectivity with other applications, and any considerations concerning key sharing, single sign-on, token-based security, and delegation of trust. You will learn the two types of channels, message passing and shared memory channels, for communication between two entities. Next, learn how to do a proper architectural risk analysis by using vulnerability analysis, ambiguity analysis, and platform vulnerability analysis. Learners then use an engineering goal-oriented model to evaluate security, and learn how to use an NFR (nonfunctional requirements) framework. Finally, the course examines data classification. This course can be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.



Objectives

Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk Assessment, Secure Interface Design, & Modeling

  • discover the key concepts covered in this course
  • recognize how to model typical threats, including advanced persistent threats, insider threats, common malware, and third-party/supplier
  • describe secure interface design for security management interfaces, out-of-band management, and log interfaces
  • describe upstream and downstream dependencies such as key and data sharing between apps
  • describe protocol design choices such as APIs, weaknesses, state, and models
  • identify common architecture frameworks
  • model non-functional security properties and constraints
  • model and classify data
  • summarize the key concepts covered in this course