We're offering 20% off September Live Online classes! See which courses are applicable.   |   Details >

  
AccountIcon BigDataIcon BlogIcon default_resource_icon CartIcon checkmark_icon cloud_devops_icon computer_network_admin_icon cyber_security_icon gsa_schedule_icon human_resources_icon location_icon phone_icon plus_icon programming_software_icon project_management_icon redhat_linux_icon search_icon sonography_icon sql_database_icon webinar_icon

Search UMBC Training Centers

Computer and Network Administration

Certified Secure Software Lifecycle Professional (CSSLP)

+ View more dates & times
    
                     
  • Overview

    Earning the globally recognized CSSLP secure software development certification is a proven way to build your career and better incorporate security practices into each phase of the software development lifecycle (SDLC).

    CSSLP certification recognizes leading application security skills. It shows employers and peers you have the advanced technical skills and knowledge necessary for authentication, authorization and auditing throughout the SDLC using best practices, policies and procedures established by the cybersecurity experts at (ISC)².

    Prove your skills, advance your career, and gain support from a community of cybersecurity leaders here to help you throughout your professional journey.

    This course is designed for software professionals that have the expertise to incorporate security practices – authentication, authorization and auditing – into each phase of the software development lifecycle (SDLC), from software design and implementation to testing and deployment. Led by an (ISC)² authorized instructor, this training seminar provides a comprehensive review of information systems security concepts and industry best practices, covering the following eight domains of the CSSLP Common Body of Knowledge (CBK®).

  • Who Should Take This Course

    PREREQUISITES

    The CSSLP is ideal for software development and security professionals responsible for applying best practices to each phase of the SDLC – from software design and implementation to testing and deployment – including those in the following positions:

    • Software Architect
    • Software Engineer
    • Software Developer
    • Application Security Specialist
    • Software Program Manager
    • Quality Assurance Tester
    • Penetration Tester
    • Software Procurement Analyst
    • Project Manager
    • Security Manager
    • IT Director/Manager

    To qualify for this certification, you must pass the exam and have at least four years of cumulative, paid work experience as a software development lifecycle professional in one or more of the eight domains of the (ISC)² CSSLP Common Body of Knowledge (CBK).

    Learn more about CSSLP Experience Requirements and how a relevant four-year degree can satisfy one year of required experience.

    Don’t have enough experience yet? You can still pass the CSSLP exam and become an Associate of (ISC)² while you earn the required work experience.

  • Why You Should Take This Course

    At the end of this course, learners will be able to:

    • Discuss the core concepts of software security and the foundational principles that drive construction of resilient software.
    • Discuss the security design principles as essential elements for building secure software.
    • Discuss software security standards and frameworks, roadmaps and strategies and risk management.
    • Explain security in software development methodologies, security metrics and security culture in software development.
    • Identify and analyze software requirements pertaining to data privacy, security and compliance with laws and regulations.
    • Describe requirement specification and tractability, misuse and abuse cases and flow down of security requirements to supplier.
    • Explain secure architecture and design elements and patterns, architectural risk assessment, threat modeling, threat intelligence and attack surface evaluation.
    • Explain security architecture and control identification, prioritization and positioning.
    • Apply secure coding practices, analyze code for security risks and implement security controls.
    • Discuss third-party code and libraries, software composition analysis and security of the build process.
    • Discuss security testing strategy plan and analyze security testing methods.
    • Discuss validation and verification, security test results and tracking security errors.
    • Describe secure software integration and deployment, security data and post-deployment security testing.
    • Recognize various security-relevant maintenance activities and discuss planning for the continuity of operations.
    • Discuss software supply chain risks and analyze security of third-party software.
    • Explain supplier security requirements in the acquisition process and support for contractual requirements.
  • Schedule
  • Course Outline
    • Domain 1.Secure Software Concepts
    • Domain 2. Secure Software Requirements
    • Domain 3. Secure Software Architecture and Design
    • Domain 4. Secure Software Implementation
    • Domain 5. Secure Software Testing
    • Domain 6. Secure Software Lifecycle Management
    • Domain 7. Secure Software Deployment, Operations, Maintenance
    • Domain 8. Secure Software Supply Chain
  • FAQs
    Is there a discount available for current students?

    UMBC students and alumni, as well as students who have previously taken a public training course with UMBC Training Centers are eligible for a 10% discount, capped at $250. Please provide a copy of your UMBC student ID or an unofficial transcript or the name of the UMBC Training Centers course you have completed. Online courses are excluded from this offer.

    What is the cancellation and refund policy?

    Student will receive a refund of paid registration fees only if UMBC Training Centers receives a notice of cancellation at least 10 business days prior to the class start date for classes or the exam date for exams.

Contact Us