The Official (ISC)² CSSLP CBK Review Seminar is the exclusive way to learn security best practices and industry standards for the software lifecycle - critical information to a CSSLP. This is where you will learn tools and processes on how security should be built into each phase of the software lifecycle. The CSSLP CBK contains the largest, most comprehensive, collection of best practices, policies, and procedures, to ensure a security initiative across all phases of application development, regardless of methodology.
Day 1
Domain 1 Secure Software Concepts
– Concepts of Secure Software
– Principles of Secure Design
– Security and Privacy
– Governance, Risk, and Compliance
– Methodologies for Software Development
Domain 2 Secure Software Requirements
– Policy Decomposition
– Classification and Categorization
– Functional Requirements: Use Cases and Abuse Cases
– Secure Software Operational Requirements
Day 2
Domain 3 Secure Software Design
– The Importance of Secure Design
– Design Considerations
– Secure Design Processes
– Securing Commonly Used Architectures
– Securing Commonly Used Technologies
Day 3
Domain 4 Secure Software Implementation/Coding
– Fundamental Programming Concepts
– Vulnerability Databases and Lists
– Defensive Coding Practices and Controls
– Secure Software Processes
Day 4
Domain 5 Secure Software Testing
– Artifacts of Testing
– Testing for Security and Quality Assurance
– Security Testing
– Defect Reporting, Tracking, and Corrective Action
– Test Data Life Cycle Management
Domain 6 Software Acceptance
– Software Acceptance Considerations
– Post-release
Day 5
Domain 7 Software Deployment, Operations, Maintenance and Disposal
– Installation and Deployment
– Operations and Maintenance
– Disposal of Software
– Domain 8 Supply Chain & Software Acquisition
– Supplier Risk Assessment
– Supplier Sourcing
– Software Development and Test
– Software Delivery, Operations, and Maintenance
– Supplier Transitioning
Our website uses both essential and non-essential cookies to analyze use of our products and services. This agreement applies to non-essential cookies only. By accepting, you are agreeing to third parties receiving information about your usage and activities. If you choose to decline this agreement, we will continue to use essential cookies for the operation of the website. View Policy