5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Certified Secure Software Lifecycle Professional (CSSLP) 2019

This 10-video course explores regulations and compliance considerations as they relate to governance, risk, and compliance (GRC). First, learners will identify legal factors, such as intellectual property and breach notifications, and learn about General Data Protection Regulations (GDPR), for which violations can result in significant financial penalties. Next, learn about standards and guidelines, including those from the International Organization for Standardization (ISO), the Payment Card Industry Data Security Standard, the National Institute for Standards and Technology (NIST), the Open Web Application Security Project (OWASP), the Software Assurance Forum for Excellence in Code, the Software Assurance Maturity Model, and Building Security In Maturity Model. You will then hear discussions of risk management and risk response. Explore common terminology, including threats, vulnerability, residual risk, controls, probability, and impact. Learn to differentiate between technical risk and business risk. The course concludes by exploring productive strategies, including mitigate, accept, transfer, and avoid. The course prepares learners for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.



Objectives

Certified Secure Software Lifecycle Professional (CSSLP) 2019: Governance, Risk, & Compliance

  • identify the objectives of the course
  • recognize regulations and compliance considerations as they relate to the governance, risk, and compliance
  • identify legal factors such as intellectual property and breach notification
  • list standards and guidelines including ISO, PCI, NIST, OWASP, SAFECode, OpenSAMM, BSIMM
  • describe risk management
  • describe risk response
  • describe common terminology including threats, vulnerability, residual risk, controls, probability, and impact
  • differentiate between technical risk and business risk
  • describe strategies including mitigate, accept, transfer, and avoid
  • summarize the key concepts covered in this course