Certified Secure Software Lifecycle Professional (CSSLP) Training

Led by an (ISC)² authorized instructor, the following Certified Secure Software Lifecycle Professional (CSSLP) Training course is an official (ISC)² training seminar for the Certified Secure Software Lifecycle Professional (CSSLP) certification, which confirms that a software professional has the expertise to incorporate security practices into each phase of the SDLC, from software design and implementation to testing and deployment.

The CSSLP Certification and provided Certified Secure Software Lifecycle Professional (CSSLP) Training course material for this official (ISC)² training seminar will teach students how to build secure software. Additionally, this Certified Secure Software Lifecycle Professional Training (CSSLP) course will also help students successfully prepare for the CSSLP exam as it provides a comprehensive review of the eight domains for the CSSLP Common Body of Knowledge (CBK).

Aside from a reserved seat in an upcoming CSSLP Certification training seminar, the resources provided to students include (ISC)²’s official courseware and student handbook. When you combine (ISC)²’s instructor-led training with the provided course material, this Certified Secure Software Lifecycle Professional Training (CSSLP) seminar is a great resource for those interested in passing the CSSLP exam or reviewing/refreshing their application security knowledge.

Your Registration Includes

  • 5 Days of CSSLP Certification Training from an Authorized (ISC)² Instructor
  • Official (ISC)² CSSLP Training Courseware
  • Official (ISC)² CSSLP Student Guide
  • *A CSSLP certification exam voucher is available for an additional fee ($549 USD)

Certified Secure Software Lifecycle Professional (CSSLP) TrainingDuration: 5 days

RESOURCES
RELATED COURSES
CUSTOMIZE It
  • We can adapt this Certified Secure Software Lifecycle Professional (CSSLP) Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Certified Secure Software Lifecycle Professional (CSSLP) Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Certified Secure Software Lifecycle Professional (CSSLP) Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified Secure Software Lifecycle Professional (CSSLP) course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP

The intended audience for the Certified Secure Software Lifecycle Professional (CSSLP) Training program is professionals who are involved in any phase of the software development life-cycle and those who are responsible for application security practices. Typically speaking, CSSLP is ideal for those working in roles such as, but not limited to:

  • Software Architect
  • Software Engineer
  • Software Developer
  • Application Security Specialist
  • Software Program Manager
  • Quality Assurance Tester
  • Penetration Tester
  • Software Procurement Analyst
  • Project Manager
  • Security Manager
  • IT Director/Manager
CLASS PREREQUISITES

The knowledge and skills that a learner must have before attending this Certified Secure Software Lifecycle Professional (CSSLP) Training course are:

  • At least four years of direct full-time secure software lifecycle professional work experience in one or more of the eight domains of the (ISC)² CSSLP Common Body of Knowledge® (CBK), or three years of direct full-time secure software lifecycle pro
Certified Secure Software Lifecycle Professional (CSSLP) Training - OBJECTIVES

This (ISC)² authorized Certified Secure Software Lifecycle Professional (CSSLP) Training seminar is based on the eight CSSLP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the CSSLP exam and enhancing their overall competencies in secure software development.

  • Domain 1: Secure Software Concepts
  • Domain 2: Secure Software Requirements
  • Domain 3: Secure Software Design
  • Domain 4: Secure Software Implementation/Programming
  • Domain 5: Secure Software Testing
  • Domain 6: Secure Software Lifecycle Management
  • Domain 7: Software Deployment, Operations, and Maintenance
  • Domain 8: Supply Chain and Software Acquisition
Certified Secure Software Lifecycle Professional (CSSLP) Training - COURSE SYLLABUS
DOMAIN 1: SECURE SOFTWARE CONCEPTS

The first domain of our Certified Secure Software Lifecycle Professional Training (CSSLP) course covers the mechanisms that permit managers of a software system to exercise a directing or restraining influence over the behavior, use, and content of the system. These concepts permit management to specify what users can do, which resources managers can access, and what operations they can perform on a system.

CSSLP Training Objectives

  • Core Concepts
  • Security Design Principles
DOMAIN 2: SECURE SOFTWARE REQUIREMENTS

The Secure Software Requirements domain covers the controls used during the requirements phase of the Software Development Lifecycle to integrate security into the software development process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules.

CSSLP Certification training Objectives

  • Identify Security Requirements
  • Interpret Data Classification Requirements
  • Identify Privacy Requirements
  • Develop Misuse and Abuse Cases
  • Include Security in Software Requirement Specifications
  • Develop Security Requirement Traceability Matrix
DOMAIN 3: SECURE SOFTWARE DESIGN

This domain, Secure Software Design, addresses the definition of the overall structure of the software from a security perspective, documenting the elements of the software attack surface, conducting threat modeling, and defining and specific security criteria that must be met before the software is released.

CSSLP Training Objectives

  • Perform Threat Modeling
  • Define the Security Architecture
  • Performing Secure Interface Design
  • Performing Architectural Risk Assessment
  • Modeling Security Properties and Constraints
  • Model and Classify Data
  • Evaluate and Select Reusable Secure Design
  • Perform Design Security Review
  • Design Secure Assembly Architecture for Component-Based Systems
  • Use Security Enhancing Architecture and Design Tools
  • Use Secure Design Principles and Patterns
DOMAIN 4: SECURE SOFTWARE IMPLEMENTATION/PROGRAMMING

The Secure Software Implementation/Programming domain involves the application of coding and testing standards, applying security testing tools including “fuzzing”, static-analysis code scanning tools, and conducting code reviews.

CSSLP Training Objectives

  • Follow Secure Coding Practices
  • Analyze Code for Security Vulnerabilities
  • Implement Security Controls
  • Fix Security Vulnerabilities
  • Look for Malicious Code
  • Securely Reuse Third Party Code or Libraries
  • Securely Integrate Components
  • Apply Security during the Build Process
  • Debug Security Errors
DOMAIN 5: SECURE SOFTWARE TESTING

The Secure Software Testing domain refers to the phase in the secure software development lifecycle where the software is functionally complete and ready to enter user beta testing. The goal of the Secure Software Testing phase is to determine if the final software meets the requirements.

CSSLP Training Objectives

  • Develop Security Test Cases
  • Develop Security Testing Strategy and Plan
  • Identify Undocumented Functionality
  • Interpret Security Implications of Test Results
  • Classify and Track Security Errors
  • Secure Test Data
  • Develop or Obtain Security Test Data
  • Perform Verification and Validation Testing
DOMAIN 6: SECURE LIFECYCLE MANAGEMENT

Domain 6 covers the content in determining if the software is ready to deliver to customers from a security viewpoint. The domain provides an overall picture of the security posture of the software and the likelihood that it will be able to withstand the attack after the software has been released to customers.

CSSLP Certification training Objectives

  • Secure Configuration and Version Control
  • Establish Security Milestones
  • Choose a Secure Software Methodology
  • Identify Security Standards and Frameworks
  • Create Security Documentation
  • Develop Security Metrics
  • Decommission Software
  • Report Security Status
  • Support Governance, Risk, and Compliance (GRC)
DOMAIN 7: SOFTWARE DEPLOYMENT, OPERATIONS, AND MAINTENANCE

The Software Deployment, Operations, and Maintenance domain deals with the vulnerabilities that have not been eliminated from the software as shipped as well as new attacks that would be discovered after the software has been shipped, and when software that was “secure” would be found to be vulnerable. The objective in this domain is to learn from errors and to use the information provided in vulnerability reports to help detect and eliminate further vulnerabilities before they are discovered in the field and used to put customers at risk. The problem management process also helps the product team and the security team adapt processes so that similar errors are not introduced in the future.

CSSLP Certification training Objectives

  • Perform Implementation Risk Analysis
  • Release Software Securely
  • Securely Store and Manage Security Data
  • Ensure Secure Installation
  • Perform Post-Deployment Security Testing
  • Obtain Security Approval to Operate
  • Perform Security Monitoring
  • Support Incident Response
  • Support Patch and Vulnerability Management
  • Support Continuity of Operations
DOMAIN 8: SUPPLY CHAIN AND SOFTWARE ACQUISITION

The last domain in this CSSLP Certification training course, Supply Chain and Software Acquisition provides a holistic outline of the knowledge and tasks required by a CSSLP candidate in managing risk for outsourced development, acquisition, and procurement of software and related services (e.g. Cloud Computing, Mobile Application development). This domain defines the expectations of an organization when acquiring software such that it can be assured that a product will not act maliciously, whether intended or not nor disrupt its business and result in negative financial impact.

CSSLP Certification training Objectives

  • Analyze Security of Third Party Software
  • Verify Pedigree and Provenance
  • Provide Security Support to the Acquisition Process
Certified Secure Software Lifecycle Professional (CSSLP) Training Course Wrap-Up

Whether you are looking for general information or have a specific question, we want to help.
Request More Information

    Time frame: