5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Certifications     (ISC)2     Certified Secure Software Lifecycle Professional (CSSLP)     Certified Secure Software Lifecycle Professional (CSSLP)

In this 19-video course, learners will explore the intricate world of secure coding practices. Topics covered in detail include declarative versus imperative (programmatic) security—whether the security is part of the application or part of the container. Next, survey defensive coding practices and control such as secure configuration, error handling, and session management. Learners will also explore cryptography, input and output sanitization, error handling, input validation, logging and auditing, and session and exception management. You will learn important information about safe application programming interfaces (APIs), including those that offer different types of functionality, such as Microsoft's Crypto API and Python's pycrypto, which both provide cryptographic functions; popular social media platforms provide their own APIs that programmers can tap into while incorporating aspects of those services. Learn more about useful concepts such as concurrency, type safety, memory management, configuration parameter management, tokenizing, and sandboxing. The course may be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.



Objectives

Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices

  • discover the key concepts covered in this course
  • recognize characteristics of declarative security
  • recognize characteristics of programmatic security
  • recognize how to use defensive coding practice to address concurrency issues leading to race condition
  • recognize examples of using configuration as a defensive coding practice
  • recognize cryptography elements such as storage, agility, encryption, and algorithm selection
  • recognize examples of using input and output sanitization as a defensive coding practice
  • recognize examples of using error handling as a defensive coding practice
  • recognize examples of using input validation as a defensive coding practice
  • recognize examples of using logging and auditing as a defensive coding practice
  • recognize examples of using session management as a defensive coding practice
  • recognize examples of using exception management as a defensive coding practice
  • distinguish between safe and unsafe API coding practices
  • distinguish between static and dynamic type safety enforcement
  • recognize characteristics of memory management as a defensive coding practice
  • recognize characteristics of configuration parameter management as a defensive coding practice
  • recognize examples of tokenizing as a defensive coding practice
  • recognize characteristics of sandboxing as a defensive coding practice
  • summarize the key concepts covered in this course