5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice     Certified Secure Software Lifecycle Professional (CSSLP) 2019

This 6-video course explores numerous concepts important in developing secure software requirements. First, learn the purpose of use cases which is a powerful graphical technique for mapping out the functional requirements of a system, and how they can be designed for both developers and testers. The course then explores misuse/abuse cases to examine prohibited activities or a typical attack, and demonstrates an attack through specific misuse case scenarios. Learners examine the benefits of a traceability matrix, a table structure used for documenting and managing requirements, and learn to track implementation details and specifics. This course explores aspects of secure software, and reliable attributes common to all secure software. You will learn that in recovering data, secure software must be predictable and designed to limit damage. Then examine the importance of gathering of security requirements while gathering software requirements. Finally, you will learn how confidentiality requirements detail the ways in which a system must protect against unauthorized disclosure. This course may be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.



Objectives

Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs

  • discover the key concepts covered in this course
  • describe how use cases model the intended behavior of the software or system
  • describe when to use misuse/abuse cases
  • list the benefits of RTM for software development
  • list software requirement specifications such as confidentiality, integrity, availability, authentication, authorization, and accountability
  • summarize the key concepts covered in this course