Course details

Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts

Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This course examines information needed to earn the (ISC)2 CSSLP (Certified Secure Software Lifecycle Professional) certification and to prepare for the CSSLP exam. These security professionals are well versed in how to incorporate key security practices into all lifecycle stages of software development. This course covers secure software concepts such as covert, overt, and encryption. You will examine the secure software concepts of confidentiality, integrity, and availability (collectively, CIA) and examine concepts that support the concepts, such as authentication, authorization, accountability, and non-repudiation. Learn the difference between various integrity concepts such as hashing, digital signatures, code signing, reliability, alterations, and authenticity. You will also learn about authentication concepts, such as multifactor authentication, identity and access management, single sign-on, and federated identity management. Learn when to use different authorization concepts, such as access controls and entitlements. Finally, the course covers accountability concepts, such as auditing and logging, and describe non-repudiation concepts, such as public key infrastructure (PKI) and digital signatures.



Expected Duration (hours)
0.4

Lesson Objectives

Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts

  • discover the key concepts covered in this course
  • recognize confidentiality concepts such as covert, overt, and encryption
  • differentiate between different integrity concepts such as hashing, digital signatures, code signing, reliability, alterations, and authenticity
  • describe different availability concepts such as failover, replication, clustering, scalability, and resiliency
  • recognize available authentication concepts such as multifactor authentication, identity and access management, single sign-on, and federated identity
  • differentiate between authorization concepts such as access controls and entitlements
  • list accountability concepts such as auditing and logging
  • describe non-repudiation concepts such as PKI and digital signatures
  • summarize the key concepts covered in this course
  • Course Number:
    it_spcsslp19_01_enus

    Expertise Level
    Expert