5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Internet and Network Technologies Solution Area     Security Solutions     Certified Secure Software Lifecycle Professional (CSSLP) 2019

Explore how to identify and assess security vulnerabilities in this 20-video course, in which you will encounter essential secure coding techniques such as versioning, peer-based code reviews, code analysis, and anti-tampering techniques. First, become familiar with malicious practices and the threats outlined in the Open Web Application Security Project (OWASP) Top 10 list and the Common Weakness Enumeration (CWE) list of software weaknesses. You will soon be able to differentiate between CWE and Common Vulnerabilities and Exposure (CVE) lists. Next, learn to describe the characteristics of injection attacks, before watching demonstrations of input validation failures such as buffer overflows, canonical form, missing defense functions, and general programming failures. You will examine how to analyze reuse code for security vulnerabilities, identify malicious code, securely reuse third-party code, and securely integrate components. Finally, learners will hear discussions of defensive coding, side channels, social engineering attacks, source code and versioning. The course prepares learners for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.



Objectives

Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Vulnerabilities

  • discover the key concepts covered in this course
  • locate and list the OWASP "Top 10"
  • locate and list the CWE list of software weaknesses
  • describe characteristics of injection attacks
  • recognize input validation failures such as buffer overflow, canonical, missing defense functions, and general programming failures
  • differentiate between common weakness enumerations and common vulnerabilities and exposure
  • describe side channels
  • describe social engineering attacks such as phishing
  • identify source code and versioning best practices
  • identify build environment best practices such as anti-tampering techniques and compiler switches
  • recognize characteristics of peer-based code reviews
  • distinguish between static and dynamic code analysis
  • list the steps for code signing
  • analyze reused code for security vulnerabilities
  • differentiate between static and dynamic analysis
  • search for and identify malicious code
  • securely reuse third party code or libraries
  • recognize how to securely integrate components such as systems of systems integration
  • debug security errors
  • summarize the key concepts covered in this course