Home Search Profile

Master CSSLP: Ultimate Secure Software Development Guide

Focused View

7:28:54

  • 1 -Introduction.mp4
    13:20
  • 2 -About Exam.mp4
    02:15
  • 1 - Domain -1 Content.html
  • 1 -0-Introduction.mp4
    02:34
  • 2 -1-CIA Guideline.mp4
    07:23
  • 3 -3-Authentication.mp4
    10:36
  • 4 -4-Authorization.mp4
    02:29
  • 5 -5-Accountability.mp4
    04:18
  • 6 -6-Non Repudiation.mp4
    01:34
  • 7 -7-Secure Development Lifecycle (SDL).mp4
    03:20
  • 8 -8-SDL Components.mp4
    02:29
  • 9 -Summary and Recap.mp4
    01:04
  • 1 -0-Introduction.mp4
    01:09
  • 2 -1-System Tenets.mp4
    03:17
  • 3 -2-Secure Design Tenets.mp4
    06:01
  • 4 -4-Adversaries.mp4
    05:12
  • 5 -Summary and Recap.mp4
    01:28
  • 6 -3-Security Models.mp4
    07:19
  • 1 - Domain 2 - Content.html
  • 1 -0.Introduction.mp4
    01:14
  • 2 -1. Functional Requirements.mp4
    05:20
  • 4 -3. Summary and Recap.mp4
    02:27
  • 1 -0. Introduction.mp4
    01:37
  • 2 -1. Regulations and Compliance.mp4
    05:02
  • 3 -2. Data Classification.mp4
    06:16
  • 4 -3. Privacy.mp4
    06:57
  • 1 -0.Introduction.mp4
    02:01
  • 2 -2. MisuseAbuse Cases.mp4
    05:07
  • 3 -3. Requirements Traceability Matrix.mp4
    04:32
  • 4 -4. Software Acquisition.mp4
    07:17
  • 5 -5. Summary.mp4
    00:57
  • 1 - Secure Software Architecture and Design.html
  • 1 -Introduction.mp4
    00:40
  • 2 -Perform Threat Modeling.mp4
    21:51
  • 3 -Defining the Security Architecture.mp4
    05:33
  • 4 -Summary and Recap.mp4
    00:29
  • 1 -Performing Architectural Risk Assessment.mp4
    01:52
  • 2 -Model (Nonfunctional) Security Properties and Constraints.mp4
    01:49
  • 3 -Model and Classify Data.mp4
    03:03
  • 4 -Perform Security Architecture and Design Review.mp4
    01:55
  • 4 - Evaluate and Select Reusable Secure Design.html
  • 5 -Define Secure Operational Architecture.mp4
    02:49
  • 6 -Introduction.mp4
    01:21
  • 7 -Use Secure Architecture and Design Principles, Patterns, and Tools.mp4
    02:40
  • 8 -Performing Secure Interface Design.mp4
    02:58
  • 9 -9-Summary.mp4
    00:58
  • 1 - Content.html
  • 1 -0 Intro.mp4
    01:14
  • 2 -1-Declarative vs. Imperative Security.mp4
    03:43
  • 3 -2-Memory Management.mp4
    04:09
  • 4 -3-Error Handling.mp4
    02:29
  • 5 -4-Interface Coding.mp4
    03:32
  • 6 -5-Primary Mitigation.mp4
    04:03
  • 7 -6-Learning from Past Mistakes.mp4
    02:57
  • 8 -7-Secure design principles.mp4
    03:35
  • 9 -8-Interconnectivity.mp4
    04:20
  • 10 -9-Cyrptographics Failures.mp4
    04:56
  • 11 -11-General Programings Failures.mp4
    04:59
  • 11 - 10-Input Validation Failuers.html
  • 12 -12-Technology Solution.mp4
    04:37
  • 13 -Summary and Recap.mp4
    00:56
  • 1 -0-Introduction.mp4
    01:18
  • 2 -1-Code Analysis.mp4
    08:01
  • 3 -2-CodePeer Review.mp4
    03:57
  • 4 -3-Code Review Objectives.mp4
    03:46
  • 5 -4-Additional Sources of Vulnerability Information.mp4
    02:02
  • 6 -5-Top25.mp4
    03:27
  • 7 -6-OWASP Vulnerability.mp4
    01:02
  • 8 -7-Common Vulnerabilities.mp4
    05:07
  • 9 -8-Summary.mp4
    00:46
  • 1 -0-Introduction.mp4
    01:25
  • 2 -1-Security Risks.mp4
    03:58
  • 3 -2-Implement Security Controls.mp4
    04:13
  • 4 -4-Anti-tampering Techniques.mp4
    04:59
  • 4 - 3-Applying Security.html
  • 5 -6-Primary Mitigations.mp4
    03:58
  • 5 - 5-Defensive Coding Techniques.html
  • 6 -7-Secure Integration of Components.mp4
    04:33
  • 7 -8- Summary and Recap.mp4
    01:47
  • 8 - Content.html
  • 1 -Introduction.mp4
    01:18
  • 1 - Content.html
  • 2 -2-Security Test Cases.mp4
    04:28
  • 3 -3-Attack Surface Evaluation.mp4
    04:19
  • 4 -4-Penetration Testing.mp4
    05:04
  • 5 -5-Common Methods.mp4
    08:44
  • 6 -6-Summary and Recap.mp4
    01:23
  • 1 -0-Introduction.mp4
    01:22
  • 2 -2-Develop a Security Testing Strategy and A Plan.mp4
    04:27
  • 3 -3-Functional Security Testing.mp4
    03:11
  • 4 -4-Non Functional Security Testing - p.mp4
    03:11
  • 5 -5-Testing Techniques.mp4
    03:59
  • 6 -6-Environment.mp4
    03:47
  • 7 -7-Standards.mp4
    04:31
  • 8 -8-Crowd Sourcing.mp4
    02:16
  • 9 -9-Summary and Recap.mp4
    01:27
  • 1 -0 - Introduction.mp4
    02:42
  • 1 - Content.html
  • 2 -1 - Secure Configuration and Version Control.mp4
    03:51
  • 3 -2 - Define Strategy and Roadmap.mp4
    04:40
  • 4 -3 - Manage Security Within a Software Development Met.mp4
    04:03
  • 5 -4 Identify Security Standards and Frameworks.mp4
    04:52
  • 6 -5 - Define and Develop Security Documentation.mp4
    03:20
  • 7 -6 - Develop Security Metrics.mp4
    03:58
  • 8 -7 - Decommission Software.mp4
    04:19
  • 9 -8 Report Security Status.mp4
    03:00
  • 10 -9 Summary and recap.mp4
    02:17
  • 1 -0-Introduction.mp4
    00:57
  • 2 -1 - Incorporate Integrated Risk Management.mp4
    05:39
  • 3 -2 - Implement Continuous Improvement.mp4
    03:12
  • 4 -3 Summary and Recap.mp4
    02:40
  • 1 - Content.html
  • 1 -0 - Introduction.mp4
    01:33
  • 2 -2-Perform Operational Risk Analysis.mp4
    04:51
  • 3 -3-Release Software Securely.mp4
    04:18
  • 4 -4-Securely Store and Manage Secur.mp4
    03:55
  • 5 -5-Ensure Secure Installation.mp4
    05:01
  • 6 -6-Perform Post-Deployment Securit.mp4
    03:00
  • 7 -7-Summary.mp4
    02:14
  • 1 -Introduction.mp4
    01:51
  • 2 -OSATO.mp4
    02:27
  • 3 -Perform Information Security Continuous Monitoring.mp4
    04:12
  • 4 -Support Incident Response.mp4
    03:55
  • 5 -Perform Patch Management.mp4
    02:31
  • 6 -Perform Vulnerability Management.mp4
    03:01
  • 7 -Runtime Protection.mp4
    03:10
  • 8 -Support Continuity of Operations.mp4
    04:42
  • 9 -Integrate Service Level Objectives and Service Level Agreements.mp4
    04:32
  • 10 - Summary.html
  • 1 - Content.html
  • 1 -1-Implement Software Supply Chain Risk Management.mp4
    02:51
  • 1 - 0-Introduction.html
  • 2 -2-Analyze Security of Third-Party Software.mp4
    04:09
  • 3 -3-Verify Pedigree and Provenance.mp4
    03:04
  • 4 - 4-Summary and Recap.html
  • 1 -1-Ensure Supplier Security Requirements in the Acquisition Process.mp4
    03:28
  • 1 - 0-Introductoin.html
  • 2 -2-Support Contractual Requirements.mp4
    04:50
  • 3 - 3-Summary.html
  • More details


    Course Overview

    This comprehensive CSSLP certification course equips you with essential secure software development skills, covering the entire lifecycle from design to deployment. Master industry best practices through hands-on learning, practice tests, and expert-curated resources.

    What You'll Learn

    • Core security concepts including CIA, authentication, and non-repudiation
    • Secure software architecture design and threat modeling
    • Secure coding practices and vulnerability mitigation techniques

    Who This Is For

    • Software Security professionals and architects
    • Application Security Specialists
    • Software Project/Program Managers

    Key Benefits

    • CSSLP exam readiness with practice questions and tests
    • Comprehensive coverage of all 8 security domains
    • Practical skills for implementing secure SDLC

    Curriculum Highlights

    1. Secure Software Core Concepts
    2. Secure Requirements & Architecture
    3. Secure Implementation & Testing
    Focused display
    • language english
    • Training sessions 121
    • duration 7:28:54
    • Release Date 2025/06/02