Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Secure Software Requirements Secure Dev Series Course 2 Of 8

    Posted By: ELK1nG
    Secure Software Requirements Secure Dev Series Course 2 Of 8

    Secure Software Requirements Secure Dev Series Course 2 Of 8
    Published 1/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 337.28 MB | Duration: 0h 59m

    Understand the critical aspects of secure software development.

    What you'll learn

    What are the critical aspects of secure development

    Identify the correct software build requirements needed for a secure software program

    Understand some of the baseline CSSLP exam content

    Determine how to specify the proper software architecture to meet your software security requirements

    Requirements

    No Requirements

    Description

    Course OverviewIn this Course 2 of the Secure Development Series we cover what secure software requirements are and why software can meet all quality requirements and still be insecure. Please note that this course is providing introductory concepts for beginners and is NOT a programming course or has any hands on.This course specifically, Secure Software Requirements is meant to provide learners a foundational start in software design that is focused around security.  The course covers foundational concepts such as the functional and non functional requirements, Policy decomposition, data classifications, and misuse casesThe course continues on to cover  Regulatory and Industry as well as legal requirements to name a few lessons. The course provides some review questions and also whiteboard discussions to provide insight into some important topics. Lastly,  the course series covers(8 courses) about 65% or more of the exam objectives for the CSSLP exam when completing all eight courses!There are many benefits of designing security early which we cover in this course.This is a series of courses for learning about "Secure Software Development Fundamentals"Course 1 - Secure Software ConceptsCourse 2 - Secure Software RequirementsCourse 3 - Secure Software DesignCourse 4 - Defining Security ArchitecturesCourse 5 - Secure Software TestingCourse 6 - Secure Software AcceptanceCourse 7 - Software Deployment, Operations and MaintenanceCourse 8 - Supply Chain and Software AcquisitionWho should take this course (Target Audience)?You are a developer or software engineer and want to understandYou want to learn IT security fundamentals focused on software developmentWhat are the Couse Pre Requirements?There are no course pre-requirementWhat You'll LearnWhat are the critical aspects of secure developmentWhat is the CIA Triad, AAA and other security fundamentalsIdentify the correct software build requirements needed for a secure software programDetermine how to specify the proper software architecture to meet your software security requirementsUnderstand what the commonly accepted best practices are software acceptanceDetermine the proper software acquisition and supply chain requirements for your software programsGet to know the proper software testing procedure for a secure software program.RequirementsNo RequirementsCourse ContentsCourse Overview Instructor Intro Course Prereqs Course Overview Instructor Intro Course Prereqs Functional and Non Functional Requirements Identifying Security Requirements Policy Decompisition Data Classification Subject Object Matrix Use Case and MisUse Case Modeling Regulartory and Industry Requirements Legal Requirements Privacy Requirements Security Requirements Traceability Matrix Course Review Course Review Questions Course Closeout

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Lecture 2 Instructor Information

    Lecture 3 Course PreReqs

    Lecture 4 Functional and Non Functional Requirements

    Lecture 5 Identifying Security Requirements

    Lecture 6 Policy Decompisition

    Lecture 7 Data Classification

    Lecture 8 Subject Object Matrix

    Lecture 9 Use Case and MisUse Case Modeling

    Lecture 10 Regulatory and Industry Requirements

    Lecture 11 Legal Requirements

    Lecture 12 Legal Requirements

    Lecture 13 Security Requirements Traceability Matrix

    Lecture 14 Course Review

    Lecture 15 Course Review Questions

    Lecture 16 Course Closeout

    You want to learn IT security fundamentals focused on software development,You are a developer or software engineer and want to understand security focused development