Description
Course info
Rating
(28)
Level
Intermediate
Updated
Aug 8, 2017
Duration
4h 36m
Description

Many applications written today are vulnerable to attack or compromise. This is because many developers are unaware of how to incorporate security principles into their applications. In this course, CSSLP®: Secure Software Concepts, you'll learn the foundational concepts of security in relation to application development, and be provided with the basis for building secure software that will withstand the attacks it will face - both accidental and intentional adverse events. First, you'll explore core concepts of secure software. Next, you'll dive into understanding the process of security design. Finally, you'll cover how to understand risk in a controlled environment as it applies to software. By the end of this course, you'll have a solid understanding of the core secure software concepts and be prepared to progress into the next domain.

About the author
About the author

Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.

More from the author
More courses by Kevin Henry
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Kevin Henry, a security consultant and computer analyst programmer and a holder of the CSSLP, the Certified Secure Software Lifecycle Professional certification. Welcome to my course on Secure Software Concepts, the first domain of the CSSLP certification. This course will help you prepare for and develop, implement, operate, and maintain secure software programs, and assist you in preparing for the CSSLP examination. This course is based on the latest version of the exam outline used to create the examination questions. I work in outreach as a security evangelist at Team Cymru, and I've been involved in the field of information systems, programming, security, and audit for many years. And I look forward to sharing with you knowledge and experience that can help you understand the techniques and objectives used to design secure programs. Software applications have become a favorite playground and point of compromise for criminals and hackers. Therefore, writing secure programs is essential. This course will examine the steps in secure software development, and address the ways to integrate security into the systems and software development lifecycle processes. Some of the major topics we will cover include the core concepts of secure software, the process of security design, and understanding risk in the control environment as it applies to software. By the end of this course, you'll have a solid understanding of the core secure software concepts, and be prepared to progress into the next domain of secure software requirements. I hope you'll join me on this journey to learn about the value, benefits, and features of the secure software lifecycle, and the role you can play in this exciting and rewarding field through this course at Pluralsight.