CSSLP: Certified Secure Software Lifecycle Professional

Overview

Duration: 5 days
CPE Credits: 40
Course Number: SEC-317
CSSLP Training: (ISC)² LOGO - Intrinsec

This authorized CSSLP training seminar is a five day, 35 CPE course offered to you by Intrinsec Security – an official training partner of (ISC)².

CSSLP Training Information
Course Overview

Led by an (ISC)² authorized instructor, the following course is an official (ISC)² training seminar for the Certified Secure Software Lifecycle Professional (CSSLP) certification, which confirms that a software professional has the expertise to incorporate security practices into each phase of the SDLC, from software design and implementation to testing and deployment.

The training and provided course material for this official (ISC)² training seminar will teach students how to build secure software. Additionally, this course will also help students successfully prepare for the CSSLP exam as it provides a comprehensive review of the eight domains for the CSSLP Common Body of Knowledge (CBK).

Aside from a reserved seat in an upcoming CSSLP training seminar, the resources provided to students include (ISC)²’s official courseware and study tools, which include the CSSLP flashcards and student handbook. When you combine (ISC)²’s instructor-led training with the provided course material, this CSSLP training seminar is a great resource for those interested in passing the CSSLP exam or reviewing/refreshing their application security knowledge.

Your Registration Includes
  • 5 Days of CSSLP Training from an Authorized (ISC)² Instructor
  • Official (ISC)² CSSLP Training Courseware
  • Official (ISC)² CSSLP Student Guide
  • 60 Days of OnDemand Access to the Recordings of your CSSLP Session (Video & Audio)
    • NOTE: for Live Online training events only.

*A CSSLP certification exam voucher is available for an additional fee ($549 USD)

What You Will Learn

This (ISC)² authorized CSSLP training seminar is based on the eight CSSLP domains of the (ISC)² Common Body of Knowledge (CBK), ensuring students successfully prepare for the CSSLP exam and enhancing their overall competencies in secure software development.

  • Domain 1: Secure Software Concepts
  • Domain 2: Secure Software Requirements
  • Domain 3: Secure Software Design
  • Domain 4: Secure Software Implementation/Programming
  • Domain 5: Secure Software Testing
  • Domain 6: Secure Software Lifecycle Management
  • Domain 7: Software Deployment, Operations, and Maintenance
  • Domain 8: Supply Chain and Software Acquisition

Domain 1: Secure Software Concepts

The first domain of our CSSLP course covers the mechanisms that permit managers of a software system to exercise a directing or restraining influence over the behavior, use, and content of the system. These concepts permit management to specify what users can do, which resources managers can access, and what operations they can perform on a system.

CSSLP Training Objectives

  • Core Concepts
  • Security Design Principles

Domain 2: Secure Software Requirements

The Secure Software Requirements domain covers the controls used during the requirements phase of the Software Development Lifecycle to integrate security into the software development process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules.

CSSLP Training Objectives

  • Identify Security Requirements
  • Interpret Data Classification Requirements
  • Identify Privacy Requirements
  • Develop Misuse and Abuse Cases
  • Include Security in Software Requirement Specifications
  • Develop Security Requirement Traceability Matrix

Domain 3: Secure Software Design

This domain, Secure Software Design, addresses the definition of the overall structure of the software from a security perspective, documenting the elements of the software attack surface, conducting threat modeling, and defining and specific security criteria that must be met before the software is released.

CSSLP Training Objectives

  • Perform Threat Modeling
  • Define the Security Architecture
  • Performing Secure Interface Design
  • Performing Architectural Risk Assessment
  • Modeling Security Properties and Constraints
  • Model and Classify Data
  • Evaluate and Select Reusable Secure Design
  • Perform Design Security Review
  • Design Secure Assembly Architecture for Component-Based Systems
  • Use Security Enhancing Architecture and Design Tools
  • Use Secure Design Principles and Patterns

Domain 4: Secure Software Implementation/Programming

The Secure Software Implementation/Programming domain involves the application of coding and testing standards, applying security testing tools including “fuzzing”, static-analysis code scanning tools, and conducting code reviews.

CSSLP Training Objectives

  • Follow Secure Coding Practices
  • Analyze Code for Security Vulnerabilities
  • Implement Security Controls
  • Fix Security Vulnerabilities
  • Look for Malicious Code
  • Securely Reuse Third Party Code or Libraries
  • Securely Integrate Components
  • Apply Security during the Build Process
  • Debug Security Errors

Domain 5: Secure Software Testing

The Secure Software Testing domain refers to the phase in the secure software development lifecycle where the software is functionally complete and ready to enter user beta testing. The goal of Secure Software Testing phase is to determine if the final software meets the requirements.

CSSLP Training Objectives

  • Develop Security Test Cases
  • Develop Security Testing Strategy and Plan
  • Identify Undocumented Functionality
  • Interpret Security Implications of Test Results
  • Classify and Track Security Errors
  • Secure Test Data
  • Develop or Obtain Security Test Data
  • Perform Verification and Validation Testing

Domain 6: Secure Lifecycle Management

Domain 6 covers the content in determining if the software is ready to deliver to customers from a security viewpoint. The domain provides an overall picture of the security posture of the software and the likelihood that it will be able to withstand attack after the software has been released to customers.

CSSLP Training Objectives

  • Secure Configuration and Version Control
  • Establish Security Milestones
  • Choose a Secure Software Methodology
  • Identify Security Standards and Frameworks
  • Create Security Documentation
  • Develop Security Metrics
  • Decommission Software
  • Report Security Status
  • Support Governance, Risk, and Compliance (GRC)

Domain 7: Software Deployment, Operations, and Maintenance

The Software Deployment, Operations, and Maintenance domain deals with the vulnerabilities that have not been eliminated from the software as shipped as well as new attacks that would be discovered after the software has been shipped, and when software that was “secure” would be found to be vulnerable. The objective in this domain is to learn from errors and to use the information provided in vulnerability reports to help detect and eliminate further vulnerabilities before they are discovered in the field and used to put customers at risk. The problem management process also helps the product team and the security team adapt processes so that similar errors are not introduced in the future.

CSSLP Training Objectives

  • Perform Implementation Risk Analysis
  • Release Software Securely
  • Securely Store and Manage Security Data
  • Ensure Secure Installation
  • Perform Post-Deployment Security Testing
  • Obtain Security Approval to Operate
  • Perform Security Monitoring
  • Support Incident Response
  • Support Patch and Vulnerability Management
  • Support Continuity of Operations

Domain 8: Supply Chain and Software Acquisition

The last domain in this course, Supply Chain and Software Acquisition, provides a holistic outline of the knowledge and tasks required by a CSSLP candidate in managing risk for outsourced development, acquisition, and procurement of software and related services (e.g. Cloud Computing, Mobile Application development). This domain defines the expectations of an organization when acquiring software such that it can be assured that a product will not act maliciously, whether intended or not, nor disrupt its business and result in negative financial impact.

CSSLP Training Objectives

  • Analyze Security of Third Party Software
  • Verify Pedigree and Provenance
  • Provide Security Support to the Acquisition Process
Audience

The intended audience for the CSSLP training program is professionals who are involved in any phase of the software development life-cycle and those who are responsible for application security practices. Typically speaking, CSSLP is ideal for those working in roles such as, but not limited to:

 

  • Software Architect
  • Software Engineer
  • Software Developer
  • Application Security Specialist
  • Software Program Manager
  • Quality Assurance Tester
  • Penetration Tester
  • Software Procurement Analyst
  • Project Manager
  • Security Manager
  • IT Director/Manager
Questions

Any questions?

Read our Frequently Asked Questions page or simply send your questions to us directly via our Contact Us page or our Live Chat.

Schedule

No public dates are currently scheduled. Request Group Training!

 

Request Group Training