Secure Software Implementation Series Secure Course 4 of 8
Understand the critical aspects of secure software design and implementation.

Secure Software Implementation Series Secure Course 4 of 8 free download
Understand the critical aspects of secure software design and implementation.
Course Overview
In this course series we cover what secure software design means and why software can meet all quality requirements and still be insecure.
Please note that this course provides introductory concepts for beginners and is NOT a programming course or has any hands-on.
This course, specifically Secure Software Implementation, is designed to provide learners with a foundational start in software design that focuses on software security, SDLC, and IT Security Fundamentals.
The course covers essential aspects of Secure Software Implementation, Common Software Vulnerabilities, and Security Controls.
The course continues on to cover Implementing Security Controls and Securing Build Systems to name a few lessons.
The course provides some review questions and a summary review.
Lastly, the 8-course series cov.ers approximately 65% or more of the exam objectives for the CSSLP exam upon completion of all eight courses.
There are many benefits of designing security early with your software build,s which we cover in this course.
This is a series of courses for learning about "Secure Software Development Fundamentals."
Course 1 - Secure Software Concepts
Course 2 - Secure Software Requirements
Course 3 - Secure Software Design
Course 4 - Defining Security Implementations
Course 5 - Secure Software Testing
Course 6 - Secure Software Acceptance
Course 7 - Software Deployment, Operations and Maintenance
Course 8 - Supply Chain and Software Acquisition
Who should take this course (Target Audience)?
You are a developer or software engineer and want to understand
You want to learn IT security fundamentals focused on software development
What are the Couse Pre Requirements?
There are no course pre-requirement
What You'll Learn
What are the critical aspects of secure development?
What is the CIA Triad, AAA, and other security fundamentals
Identify the correct software build requirements needed for a secure software program
Determine how to specify the proper software architecture to meet your software security requirements
Understand what the commonly accepted best practices are for software acceptance
Determine the proper software acquisition and supply chain requirements for your software programs
Learn the proper software testing procedure for developing a secure software program.
Requirements
No Requirements
Course Contents
Course Overview, Instructor Intro, Course Prereqs
Main Modules: Secure Software Implementation, Common Software Vulnerabilities, Security Controls, Implementing Security Controls. Securing Build Systems
Review Questions
Course Closeout