CSSLP®: Secure Lifecycle Management
Offered By: Pluralsight
Course Description
Overview
This is the sixth domain of the CSSLP and addresses the topics the exam candidate needs to know to secure software throughout its entire lifecycle - from project initiation to product replacement or retirement. How to build it - and keep it secure.
In this course, CSSLP®: Secure Lifecycle Management, you will learn how to ensure that software is designed and developed to operate securely, and will remain secure even as changes are made in the software itself or in its operational environment. First, you will learn about software support in business and management requirements to protect data and business assets and comply with laws and regulations. Next you will learn about the need for version control and the value of documentation. Finally you will touch on the decommissioning of software that presents security challenges that are addressed in this course. By the end of this course, you'll be prepared to progress into the next domain of the CSSLP®.
Topics:
In this course, CSSLP®: Secure Lifecycle Management, you will learn how to ensure that software is designed and developed to operate securely, and will remain secure even as changes are made in the software itself or in its operational environment. First, you will learn about software support in business and management requirements to protect data and business assets and comply with laws and regulations. Next you will learn about the need for version control and the value of documentation. Finally you will touch on the decommissioning of software that presents security challenges that are addressed in this course. By the end of this course, you'll be prepared to progress into the next domain of the CSSLP®.
Topics:
- Course Overview
- Identify Security Standards and Frameworks
- Secure Configuration
- Decommission Software
Taught by
Kevin Henry
Related Courses
Engineering Maintainable Android AppsVanderbilt University via Coursera Developing Secure Software
LinkedIn Learning OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE)
LinkedIn Learning AZ-400: Implement security and validate code bases for compliance
Microsoft via Microsoft Learn Parametrize Queries to Protect Against Injections with Java
Coursera Project Network via Coursera