->

Secure Software Design Secure Software Series Course 3 of 8

Published 1/2023Created by Joseph Holbrook (The Cloud Tech Guy)MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 ChGenre: eLearning | Language: English | Duration: 14 Lectures ( 1h 15m ) | Size: 434 MB


 

Detee how to specify the proper software architecture to meet your software security requirements

Identify the correct software build requirements needed for a secure software program

What are the critical aspects of secure development

Anyone preparing for the (ISC)² Certified Secure Software Lifecycle Professional (CSSLP) exam would benefit as well

No PreReqs

Course OverviewIn this course series we cover what secure software design means and why software can meet all quality requirements and still be insecure. Please note that this course is providing introductory concepts for bners and is NOT a programming course or has any hands on.This course specifically, Secure Software Design is meant to provide learners a foundational start in software design that is focused around security.  The course covers important aspects around the need for Secure Software Design, understanding the Attack Surface Evaluation processes and what a Threat Model Attack Tree is.  The course continues on to cover Secure Design Review, Risk Management, how to Define Security Architecture and a  Whiteboard Discussion to name a few lessons. The course provides some review questions and also whiteboard discussions to provide insight into some important topics. Lastly,  the course series covers about 65% or more of the exam objectives for the CSSLP exam when completing all eight courses! There are many benefits of designing security early which we cover in this course.This is a series of courses for learning about "Secure Software Development Fundamentals"Course 1 - Secure Software ConceptsCourse 2 - Secure Software RequirementsCourse 3 - Secure Software DesignCourse 4 - Defining Security ArchitecturesCourse 5 - Secure Software TestingCourse 6 - Secure Software AcceptanceCourse 7 - Software Deployment, Operations and MaintenanceCourse 8 - Supply Chain and Software AcquisitionWho should take this course (Target Audience)?You are a developer or software eeer and want to understandYou want to learn IT security fundamentals focused on software developmentWhat are the Couse Pre Requirements?There are no course pre-requirementWhat You'll LearnWhat are the critical aspects of secure developmentWhat is the CIA Triad, AAA and other security fundamentalsIdentify the correct software build requirements needed for a secure software programDetee how to specify the proper software architecture to meet your software security requirementsUnderstand what the commonly accepted best practices are software acceptanceDetee the proper software acquisition and supply chain requirements for your software programsGet to know the proper software testing procedure for a secure software program.RequirementsNo RequirementsCourse ContentsCourse Overview, Instructor Intro, Course PrereqsMain Modules covered are:  Need for Secure Software Design Attack Surface Evaluation Threat Model Attack Tree Secure Design Review Risk Management Define Security Architecture Whiteboard Discussion Module Review  Review Questions Course Closeout

You want to learn IT security fundamentals focused on software development

ou are a developer or software eeer and want to understand Secure Design Principles

HomePage:

https://www.udemy.com/course/secure-software-design-secure-software-series-course-3-of-8/

 

Secure Software Design Secure Software Series Course 3 of 8

 

 


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Themelli   |  

Information
Members of Guests cannot leave comments.




rss