Secure Software Requirements Secure Dev Series Course 2 of 8
What you'll learn
- What are the critical aspects of secure development
- Identify the correct software build requirements needed for a secure software program
- Understand some of the baseline CSSLP exam content
- Determine how to specify the proper software architecture to meet your software security requirements
- No Requirements
In this Course 2 of the Secure Development Series we cover what secure software requirements are and why software can meet all quality requirements and still be insecure.
Please note that this course is providing introductory concepts for beginners and is NOT a programming course or has any hands on.
This course specifically, Secure Software Requirements is meant to provide learners a foundational start in software design that is focused around security. The course covers foundational concepts such as the functional and non functional requirements, Policy decomposition, data classifications, and misuse cases
The course continues on to cover Regulatory and Industry as well as legal requirements to name a few lessons.
The course provides some review questions and also whiteboard discussions to provide insight into some important topics.
Lastly, the course series covers(8 courses) about 65% or more of the exam objectives for the CSSLP exam when completing all eight courses!
There are many benefits of designing security early which we cover in this course.
This is a series of courses for learning about "Secure Software Development Fundamentals"
Course 1 - Secure Software Concepts
Course 2 - Secure Software Requirements
Course 3 - Secure Software Design
Course 4 - Defining Security Architectures
Course 5 - Secure Software Testing
Course 6 - Secure Software Acceptance
Course 7 - Software Deployment, Operations and Maintenance
Course 8 - Supply Chain and Software Acquisition
Who should take this course (Target Audience)?
You are a developer or software engineer and want to understand
You want to learn IT security fundamentals focused on software development
What are the Couse Pre Requirements?
There are no course pre-requirement
What You'll Learn
What are the critical aspects of secure development
What is the CIA Triad, AAA and other security fundamentals
Identify the correct software build requirements needed for a secure software program
Determine how to specify the proper software architecture to meet your software security requirements
Understand what the commonly accepted best practices are software acceptance
Determine the proper software acquisition and supply chain requirements for your software programs
Get to know the proper software testing procedure for a secure software program.
Course Overview Instructor Intro Course Prereqs Course Overview Instructor Intro Course Prereqs Functional and Non Functional Requirements Identifying Security Requirements Policy Decompisition Data Classification Subject Object Matrix Use Case and MisUse Case Modeling Regulartory and Industry Requirements Legal Requirements Privacy Requirements Security Requirements Traceability Matrix Course Review Course Review Questions Course Closeout
Who this course is for:
- You want to learn IT security fundamentals focused on software development
- You are a developer or software engineer and want to understand security focused development
Joe Holbrook is based out of Jacksonville, Florida and is the owner of TechCommanders. Joe has lived and worked in cities such as Boston, San Jose, San Diego, Washington, DC and Charleston, SC.
Joe is an avid traveler and has been in over 42 countries... He is married with one child. He is a big hockey fan and enjoys a good beach day.
Joseph Holbrook has been in the computer field since 1993 when he was exposed to several HPUX systems on board a US Navy flagship. He has migrated from UNIX world to Storage Area Networking(SAN) and Enterprise Virtualization and Cloud Architecture. He worked for numerous companies like HDS, 3PAR, Brocade, HP, EMC, Northrup Grumman, ViON, Ibasis dot net, Chematch dot com, SAIC, Signature Consultants, Global Knowledge and Dimension Data.
I wish you much success in your careers!