Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CSSLP Cert Prep: 3 Secure Software Design

Description

Learn the foundations of secure software design as you prepare for the third domain of the Certified Secure Software Lifecycle Professional (CSSLP) exam.

Tags

Syllabus

Syllabus IntroductionSecure software design1. Threat ModelingWhat is threat modeling?Understand common threatsAttack surface evaluation2. Security ArchitectureIdentifying and prioritizing controlsTraditional security architecturesPervasive and ubiquitous computingIdentifying and prioritizing controlsCloud architecturesEmbedded system considerationsArchitectural risk assessmentsComponent-based systemsSecurity enhancing toolsCognitive computingControl systems3. Security DesignComponents of a secure environmentDesigning network and server controlsDesigning data controlsSecure design principles and patternsSecure interface designDesign security reviewSecure operational architecture4. ModelingNonfunctional properties and constraintsData modeling and classificationConclusionNext steps Read more


CSSLP Cert Prep: 3 Secure Software Design

Affiliate notice

Learn the foundations of secure software design as you prepare for the third domain of the Certified Secure Software Lifecycle Professional (CSSLP) exam.

Syllabus IntroductionSecure software design1. Threat ModelingWhat is threat modeling?Understand common threatsAttack surface evaluation2. Security ArchitectureIdentifying and prioritizing controlsTraditional security architecturesPervasive and ubiquitous computingIdentifying and prioritizing controlsCloud architecturesEmbedded system considerationsArchitectural risk assessmentsComponent-based systemsSecurity enhancing toolsCognitive computingControl systems3. Security DesignComponents of a secure environmentDesigning network and server controlsDesigning data controlsSecure design principles and patternsSecure interface designDesign security reviewSecure operational architecture4. ModelingNonfunctional properties and constraintsData modeling and classificationConclusionNext steps Read more