وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Master Secure Software Development : Complete CSSLP Guide

سرفصل های دوره

CSSLP Certification, includes Practice Questions and Tests, MindMaps, FlashCards & Pdf Notes


1 - Introduction
  • 1 -Introduction
  • 2 -About Exam

  • 2 - Domain-1 Secure Software Core Concepts
  • 1 - Domain -1 Content.html

  • 3 - Domain 1 - 1.1 Core Concepts
  • 1 -0-Introduction
  • 2 -1-CIA Guideline
  • 3 -3-Authentication
  • 4 -4-Authorization
  • 5 -5-Accountability
  • 6 -6-Non Repudiation
  • 7 -7-Secure Development Lifecycle (SDL)
  • 8 -8-SDL Components
  • 9 -Summary and Recap

  • 4 - Domain 1 - 1.2 Security Design Principles
  • 1 -0-Introduction
  • 2 -1-System Tenets
  • 3 -2-Secure Design Tenets
  • 4 -4-Adversaries
  • 5 -Summary and Recap
  • 6 -3-Security Models

  • 5 - Domain 2 - Secure Software Requirements
  • 1 - Domain 2 - Content.html

  • 6 - Domain 2 - 2.1 Defining Software Requirements
  • 1 -0.Introduction
  • 2 -1. Functional Requirements
  • 4 -3. Summary and Recap

  • 7 - Domain 2- 2.2 Identify and Analyze Compliance Requirements
  • 1 -0. Introduction
  • 2 -1. Regulations and Compliance
  • 3 -2. Data Classification
  • 4 -3. Privacy

  • 8 - Domain 2 - 2.3 Misuse and Abuse cases
  • 1 -0.Introduction
  • 2 -2. MisuseAbuse Cases
  • 3 -3. Requirements Traceability Matrix
  • 4 -4. Software Acquisition
  • 5 -5. Summary

  • 9 - Secure Software Architecture and Design
  • 1 - Secure Software Architecture and Design.html

  • 10 - 3.1.2 Defining the Security Architecture
  • 1 -Introduction
  • 2 -Perform Threat Modeling
  • 3 -Defining the Security Architecture
  • 4 -Summary and Recap

  • 11 - Quiz Assessment

    12 - Domain 3 - 3.2 Secure Software Design
  • 1 -Performing Architectural Risk Assessment
  • 2 -Model (Nonfunctional) Security Properties and Constraints
  • 3 -Model and Classify Data
  • 4 -Perform Security Architecture and Design Review
  • 4 - Evaluate and Select Reusable Secure Design.html
  • 5 -Define Secure Operational Architecture
  • 6 -Introduction
  • 7 -Use Secure Architecture and Design Principles, Patterns, and Tools
  • 8 -Performing Secure Interface Design
  • 9 -9-Summary

  • 13 - Domain 4 - Secure Software Implementation - Content
  • 1 - Content.html

  • 14 - Domain 4 - 4.1 Secure Coding Practices
  • 1 -0 Intro
  • 2 -1-Declarative vs. Imperative Security
  • 3 -2-Memory Management
  • 4 -3-Error Handling
  • 5 -4-Interface Coding
  • 6 -5-Primary Mitigation
  • 7 -6-Learning from Past Mistakes
  • 8 -7-Secure design principles
  • 9 -8-Interconnectivity
  • 10 -9-Cyrptographics Failures
  • 11 -11-General Programings Failures
  • 11 - 10-Input Validation Failuers.html
  • 12 -12-Technology Solution
  • 13 -Summary and Recap

  • 15 - Domain 4 - 4.2 Analyze Code for Security Risks
  • 1 -0-Introduction
  • 2 -1-Code Analysis
  • 3 -2-CodePeer Review
  • 4 -3-Code Review Objectives
  • 5 -4-Additional Sources of Vulnerability Information
  • 6 -5-Top25
  • 7 -6-OWASP Vulnerability
  • 8 -7-Common Vulnerabilities
  • 9 -8-Summary

  • 16 - Domain 4 - 4.3 Implement Security Controls
  • 1 -0-Introduction
  • 2 -1-Security Risks
  • 3 -2-Implement Security Controls
  • 4 -4-Anti-tampering Techniques
  • 4 - 3-Applying Security.html
  • 5 -6-Primary Mitigations
  • 5 - 5-Defensive Coding Techniques.html
  • 6 -7-Secure Integration of Components
  • 7 -8- Summary and Recap
  • 8 - Content.html

  • 17 - Domain 5 - 5.1 Security Test Cases
  • 1 -Introduction
  • 1 - Content.html
  • 2 -2-Security Test Cases
  • 3 -3-Attack Surface Evaluation
  • 4 -4-Penetration Testing
  • 5 -5-Common Methods
  • 6 -6-Summary and Recap

  • 18 - Domain 5 - 5.2 Security Testing Strategy and Plan
  • 1 -0-Introduction
  • 2 -2-Develop a Security Testing Strategy and A Plan
  • 3 -3-Functional Security Testing
  • 4 -4-Non Functional Security Testing - p
  • 5 -5-Testing Techniques
  • 6 -6-Environment
  • 7 -7-Standards
  • 8 -8-Crowd Sourcing
  • 9 -9-Summary and Recap

  • 19 - Domain 6 - 6.1 Secure Configuration and Version Control
  • 1 -0 - Introduction
  • 1 - Content.html
  • 2 -1 - Secure Configuration and Version Control
  • 3 -2 - Define Strategy and Roadmap
  • 4 -3 - Manage Security Within a Software Development Met
  • 5 -4 Identify Security Standards and Frameworks
  • 6 -5 - Define and Develop Security Documentation
  • 7 -6 - Develop Security Metrics
  • 8 -7 - Decommission Software
  • 9 -8 Report Security Status
  • 10 -9 Summary and recap

  • 20 - Domain 6 - 6.2 Software Risk Management
  • 1 -0-Introduction
  • 2 -1 - Incorporate Integrated Risk Management
  • 3 -2 - Implement Continuous Improvement
  • 4 -3 Summary and Recap

  • 21 - Domain 7 - Secure Software Deployment, Operations, Maintenance
  • 1 - Content.html

  • 22 - Domain 7 - 7.1 Secure Software Deployment
  • 1 -0 - Introduction
  • 2 -2-Perform Operational Risk Analysis
  • 3 -3-Release Software Securely
  • 4 -4-Securely Store and Manage Secur
  • 5 -5-Ensure Secure Installation
  • 6 -6-Perform Post-Deployment Securit
  • 7 -7-Summary

  • 23 - 7.2 Secure Software Operations and Maintenance
  • 1 -Introduction
  • 2 -OSATO
  • 3 -Perform Information Security Continuous Monitoring
  • 4 -Support Incident Response
  • 5 -Perform Patch Management
  • 6 -Perform Vulnerability Management
  • 7 -Runtime Protection
  • 8 -Support Continuity of Operations
  • 9 -Integrate Service Level Objectives and Service Level Agreements
  • 10 - Summary.html

  • 24 - Domain-8 Secure Software Supply Chain
  • 1 - Content.html

  • 25 - Domain 8 - 8.1 Software Supply Chain Risk Management
  • 1 -1-Implement Software Supply Chain Risk Management
  • 1 - 0-Introduction.html
  • 2 -2-Analyze Security of Third-Party Software
  • 3 -3-Verify Pedigree and Provenance
  • 4 - 4-Summary and Recap.html

  • 26 - Domain 8- 8.2 Supplier Security Requirements
  • 1 -1-Ensure Supplier Security Requirements in the Acquisition Process
  • 1 - 0-Introductoin.html
  • 2 -2-Support Contractual Requirements
  • 3 - 3-Summary.html

  • 27 - Practice Tests
    139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    مدرس:
    شناسه: 42326
    حجم: 1140 مگابایت
    مدت زمان: 449 دقیقه
    تاریخ انتشار: ۹ دی ۱۴۰۳
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید