Length: 5 Days
Print Friendly, PDF & Email

Certified Secure Software Lifecycle Professional (CSSLP) Training Course by Tonex

Engineering Management Workshop (EMW) by Tonex

The Certified Secure Software Lifecycle Professional (CSSLP) Training by Tonex equips professionals with the essential knowledge and skills to integrate security into every phase of the software development lifecycle.

This comprehensive course covers industry best practices, security principles, and hands-on exercises to ensure participants can confidently contribute to building secure software systems.

The Certified Secure Software Lifecycle Professional (CSSLP) credential is a globally recognized certification that validates the expertise of professionals in integrating security measures across the software development lifecycle.

Offered by Tonex, this certification ensures individuals possess the knowledge and skills to identify, assess, and remediate security vulnerabilities from project inception to deployment and maintenance. CSSLP holders are equipped to implement secure coding practices, adhere to industry regulations, and address security concerns in agile and DevOps environments.

The certification emphasizes secure software design, coding, testing, deployment, and maintenance, making it an essential qualification for professionals committed to building robust and secure software systems.

This course has been crafted to guide you through every facet of the secure software lifecycle. It encompasses planning, design, development, procurement, testing, deployment, maintenance, and software management. Throughout this course, you will acquire a set of software methodologies aimed at crafting secure and resilient software that meets compliance, quality, functionality, and assurance requirements. These methodologies are rooted in design principles and processes.

Participants will also grasp programming concepts essential for safeguarding software against vulnerabilities. Furthermore, you will develop the skills needed to effectively manage risk by adopting industry standards and best practices for proper software development and testing. You’ll also learn to utilize tools and resources that are crucial for mitigating risk throughout the entire product lifecycle. All of this will prepare you for the official (ISC)2 CSSLP exam.

LEARNING OBJECTIVES:

Upon completion of the CSSLP Training, participants will be able to:

  • Assess and mitigate security risks throughout the software development lifecycle.
  • Implement security controls in design, code, testing, and deployment phases.
  • Demonstrate proficiency in secure coding practices and vulnerability management.
  • Apply security principles to ensure compliance with industry regulations.
  • Integrate security measures into agile and DevOps environments.
  • Prepare for the Certified Secure Software Lifecycle Professional (CSSLP) exam.

AUDIENCE:

This course is designed for:

  • Software developers and engineers
  • Security architects and analysts
  • Project managers and team leads
  • Quality assurance professionals
  • IT managers and executives
  • Anyone involved in the software development lifecycle concerned with security.

Course Modules:

Pre-test 1

Module 1: Introduction to Secure Software Development

  • Overview of the CSSLP certification
  • Importance of security in the software development lifecycle
  • Legal and regulatory considerations
  • Security governance and risk management
  • Secure software development methodologies
  • Security controls in SDLC phases

Module 2: Secure Software Requirements

  • Gathering and documenting security requirements
  • Risk assessment and threat modeling
  • Security use cases and abuse cases
  • Secure coding standards and guidelines
  • Security metrics and measurement
  • Security in agile and DevOps environments

Module 3: Secure Software Design

  • Secure design principles and patterns
  • Security architecture and models
  • Secure data management and protection
  • Cryptographic principles and implementation
  • Secure coding practices in design
  • Security reviews and design validation

Module 4: Secure Software Implementation/Coding

  • Secure coding techniques and best practices
  • Input validation and output encoding
  • Memory management and buffer overflows
  • Code analysis tools and techniques
  • Code-level security testing
  • Integration of security into the build process

Module 5: Secure Software Testing

  • Importance of testing in secure software development
  • Security testing methodologies
  • Penetration testing and ethical hacking
  • Automated security testing tools
  • Test data management and security
  • Incident response and handling in testing

Module 6: Secure Software Deployment, Operations, Maintenance, and Disposal

  • Secure deployment strategies
  • Configuration management and security
  • Patch management and vulnerability management
  • Incident response and recovery
  • Secure decommissioning and disposal
  • Continuous improvement in secure software development

Workshop 1: Overview of CSSLP Certification Exam (Domains)

  • Secure Software Concepts
  • Secure Software Lifecycle Management
  • Secure Software Requirements
  • Secure Software Architecture and Design
  • Secure Software Implementation
  • Secure Software Testing
  • Secure Software Deployment, Operations, Maintenance
  • Secure Software Supply Chain

Workshop 2: Analyzing and Understanding CSSLP Domains

Domain 1: Secure Software Concepts

  • – Understand core concepts
  • – Understand security design principles

Domain 2: Secure Software Lifecycle Management

  • 1 – Manage security within a software development methodology (e.g., Agile, waterfall)
  • 2 – Identify and adopt security standards (e.g., implementing security frameworks, promoting security awareness)
  • 3 – Outline strategy and roadmap
  • 4 – Define and develop security documentation
  • 5 – Define security metrics (e.g., criticality level, average remediation time, complexity, Key Performance Indicators (KPI), objectives and key results)
  • 6 – Decommission applications
  • Data disposition (e.g., retention, destruction, dependencies)
  • 7 – Create security reporting mechanisms (e.g., reports, dashboards, feedback loops)
  • 8 – Incorporate integrated risk management methods
  • 9 – Implement secure operation practices

Domain 3: Secure Software Requirements

  • 1 – Define software security requirements
  • 2 – Identify compliance requirements
  • 3 – Identify data classification requirements
  • 4 – Identify privacy requirements
  • 5 – Define data access provisioning
  • 6 – Develop misuse and abuse
  • 7 – Develop security requirement traceability matrix
  • 8 – Define third-party vendor security requirements

Domain 4: Secure Software Architecture and Design

  • 1 – Define the security architecture
  • 2 – Perform secure interface design
  • 3 – Evaluate and select reusable technologies
  • 4 – Perform threat modeling
  • 5 – Perform architectural risk assessment and design reviews
  • 6 – Model (non-functional) security properties and constraints
  • 7 – Define secure operational architecture (e.g., deployment topology, operational interfaces, Continuous Integration and Continuous Delivery (CI/CD))

Domain 5: Secure Software Implementation

  • 1 – Adhere to relevant secure coding practices (e.g., standards, guidelines, regulations)
  • 2 – Analyze code for security risks
  • 3 – Implement security controls (e.g., watchdogs, file integrity monitoring, anti-malware)
  • 4 – Address the identified security risks (e.g., risk strategy)
  • 5 – Evaluate and integrate components
  • 6 – Apply security during the build process

Domain 6: Secure Software Testing

  • 1 – Develop security testing strategy & plan
  • 2 – Develop security test cases
  • 3 – Verify and validate documentation (e.g., installation and setup instructions, error messages, user guides, release notes)
  • 4 – Identify undocumented functionality
  • 5 – Analyze security implications of test results (e.g., impact on product management, prioritization, break/build criteria)
  • 6 – Classify and track security errors
  • 7 – Secure test data
  • 8 – Perform verification and validation testing (e.g., independent/internal verification and validation, acceptance test)

Domain 7: Secure Software Deployment, Operations, Maintenance

  • 1 – Perform operational risk analysis
  • 2 – Secure configuration and version control
  • 3 – Release software securely
  • 4 – Store and manage security data
  • 5 – Ensure secure installation
  • 6 – Obtain security approval to operate (e.g., risk acceptance, sign-off at appropriate level)
  • 7 – Perform information security continuous monitoring
  • 8 – Execute the incident response plan
  • 9 – Perform patch management (e.g. secure release, testing)
  • 10 – Perform vulnerability management (e.g., tracking, triaging, Common Vulnerabilities and Exposures (CVE))
  • 11 – Incorporate runtime protection (e.g., Runtime Application Self Protection (RASP), web application firewall (WAF), Address Space Layout Randomization (ASLR), dynamic execution prevention)
  • 12 – Support continuity of operations
  • 13 – Integrate service level objectives and service-level agreements (SLA) (e.g., maintenance, performance, availability, qualified personnel)

Domain 8: Secure Software Supply Chain

8.1 – Implement software supply chain risk management (e.g., International Organization for Standardization (ISO), National Institute of Standards and Technology (NIST))

8.2 – Analyze security of third-party software

8.3 – Verify pedigree and provenance

8.4 – Ensure and verify supplier security requirements in the acquisition process

8.5 – Support contractual requirements (e.g., intellectual property ownership, code escrow, liability, warranty, End-User License Agreement (EULA), service-level agreements (SLA))

Post-tests

Final Project:

Participants can work on a small final project where they apply the knowledge gained during the workshop.

 

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.