Secure Software Supply Chain for CSSLP®

This course covers 11% of the CSSLP® examination. You will learn how to securely manage third party software to support business goals and regulatory requirements.
Course info
Level
Intermediate
Updated
Dec 2, 2020
Duration
1h 21m
Table of contents
Description
Course info
Level
Intermediate
Updated
Dec 2, 2020
Duration
1h 21m
Description

Many organizations are dependent on third party software to support business operations and it is essential to ensure that this software is secure and meets legal requirements. In this course, Secure Software Supply Chain for CSSLP®, you will learn foundational knowledge about managing the security of this third party software. First, you will discover the process of selecting a vendor. Next, you will learn to manage the risk of software acquisition and deployment. Finally, you will explore how to assess the security of software during operations. When you are finished with this course, you will have the skills and knowledge of secure software supply chain needed to manage security risk and prepare for the CSSLP® examination.

About the author
About the author

Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.

More from the author
Software Development Security for CISSP®
Intermediate
2h 44m
May 7, 2021
Exam Review and Tips for CISSP®
Intermediate
33m
May 7, 2021
More courses by Kevin Henry
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, everyone. My name is Kevin Henry, a security consultant and computer analyst programmer, and holder of the CSSLP, Certified Secure Software Lifecycle Professional certification. Welcome to my course on Secure Software Supply Chain for the CSSLP, the eighth and final domain of this certification path. I look forward to sharing knowledge and experiences with you. This course will help you understand and evaluate the business and security risks associated with using third‑party software, and assist you in preparing for the examination. Many organizations are dependent on third‑party software to support business operations, and it's essential to ensure that this software is secure and meets legal requirements. We will cover software supply chain risk management, managing software acquisition, and assessment of supply chain operations. I hope you'll join me in this journey to learn about managing the security of third‑party software and the role you can play in this exciting and rewarding field through this course at Pluralsight.