Sharing Is Caring:

Secure Software Design Secure Software Series Course 3 of 8

  • Understand the critical aspects of secure software design and development.
  • Free tutorial
  • Rating: 5.0 out of 55.0 (3 ratings)
  • 487 students
  • 1hr 15min of on-demand video
  • Created by Joseph Holbrook (The Cloud Tech Guy)

English

What you’ll learn

  • Determine how to specify the proper software architecture to meet your software security requirements
  • Identify the correct software build requirements needed for a secure software program
  • What are the critical aspects of secure development
  • Anyone preparing for the (ISC)² Certified Secure Software Lifecycle Professional (CSSLP) exam would benefit as well

Requirements

  • No PreReqs

Description

Course Overview

In this course series we cover what secure software design means and why software can meet all quality requirements and still be insecure.

Please note that this course is providing introductory concepts for beginners and is NOT a programming course or has any hands on.

This course specifically, Secure Software Design is meant to provide learners a foundational start in software design that is focused around security.  The course covers important aspects around the need for Secure Software Design, understanding the Attack Surface Evaluation processes and what a Threat Model Attack Tree is. 

The course continues on to cover Secure Design Review, Risk Management, how to Define Security Architecture and a  Whiteboard Discussion to name a few lessons.

The course provides some review questions and also whiteboard discussions to provide insight into some important topics.

Read Also -->   How To Make Passive Income on Amazon KDP with Zero dollars

Lastly,  the course series covers about 65% or more of the exam objectives for the CSSLP exam when completing all eight courses!

There are many benefits of designing security early which we cover in this course.

This is a series of courses for learning about “Secure Software Development Fundamentals”

  • Course 1 – Secure Software Concepts
  • Course 2 – Secure Software Requirements
  • Course 3 – Secure Software Design
  • Course 4 – Defining Security Architectures
  • Course 5 – Secure Software Testing
  • Course 6 – Secure Software Acceptance
  • Course 7 – Software Deployment, Operations and Maintenance
  • Course 8 – Supply Chain and Software Acquisition

Who should take this course (Target Audience)?

  • You are a developer or software engineer and want to understand
  • You want to learn IT security fundamentals focused on software development

What are the Couse Pre Requirements?

There are no course pre-requirement

What You’ll Learn

  • What are the critical aspects of secure development
  • What is the CIA Triad, AAA and other security fundamentals
  • Identify the correct software build requirements needed for a secure software program
  • Determine how to specify the proper software architecture to meet your software security requirements
  • Understand what the commonly accepted best practices are software acceptance
  • Determine the proper software acquisition and supply chain requirements for your software programs
  • Get to know the proper software testing procedure for a secure software program.

Requirements

  • No Requirements

Course Contents

  • Course Overview, Instructor Intro, Course Prereqs
  • Main Modules covered are:  Need for Secure Software Design Attack Surface Evaluation Threat Model Attack Tree Secure Design Review Risk Management Define Security Architecture Whiteboard Discussion Module Review 
  • Review Questions
  • Course Closeout
Read Also -->   Attract your dream client on Instagram

Who this course is for:

  • You want to learn IT security fundamentals focused on software development
  • ou are a developer or software engineer and want to understand Secure Design Principles

Show less

Course content

1 section • 14 lectures • 1h 15m total length

Welcome to the Course14 lectures • 1hr 15min

  • Introduction02:19
  • Instructor Overview01:07
  • Course PreReqs00:43
  • Need For Secure Software Design06:23
  • Attack Surface Evaluation03:33
  • Threat Modeling18:49
  • Attack Tree01:47
  • Secure Design Review (SDR)05:29
  • Risk Management07:33
  • Define Security Architecture13:42
  • Whiteboard Discussion Secure Design07:28
  • Course Review Summary02:08
  • Course Review Questions02:58
  • Course Closeout01:01

👇👇👇👇 Click Below to Enroll in Free Udemy Course 👇👇👇👇

Go to Course

👇👇 See Also 👇👇

Join Us Join Us Join Us
Sharing Is Caring:

Leave a Comment

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
100% Free SEO Tools - Tool Kits PRO