Published 1/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 425.45 MB | Duration: 1h 18m
Understand the critical aspects of secure software development.
What you'll learn
What are the critical aspects of secure development
What is the CIA Triad, AAA and other security fundamentals
Identify the correct software build requirements needed for a secure software program
Determine how to specify the proper software architecture to meet your software security requirements
Understand what the commonly accepted best practices are software acceptance
Anyone preparing for the (ISC)² Certified Secure Software Lifecycle Professional (CSSLP) exam would benefit as well
Requirements
There are no course pre-requirement
Description
Course OverviewIn this course series we cover what secure software design means and why software can meet all quality requirements and still be insecure. Please note that this course is providing introductory concepts for beginners and is NOT a programming course or has any hands on.This course specifically, Secure Software Concepts is meant to provide learners a foundational start in software design that is focused around security. The course covers foundational concepts such as the CIA Triad, AAA, Encryption, Separation of Duties, Fail Safe and much more. The course continues on to cover Open Design concepts, Least Common Mechanism to name a few lessons. The course provides some review questions and also whiteboard discussions to provide insight into some important topics. Lastly, the course series covers about 65% or more of the exam objectives for the CSSLP exam when completing all eight courses! There are many benefits of designing security early which we cover in this course.This is a series of courses for learning about "Secure Software Development Fundamentals"Course 1 - Secure Software ConceptsCourse 2 - Secure Software RequirementsCourse 3 - Secure Software DesignCourse 4 - Defining Security ArchitecturesCourse 5 - Secure Software TestingCourse 6 - Secure Software AcceptanceCourse 7 - Software Deployment, Operations and MaintenanceCourse 8 - Supply Chain and Software AcquisitionWho should take this course (Target Audience)?You are a developer or software engineer and want to understandYou want to learn IT security fundamentals focused on software developmentWhat are the Couse Pre Requirements?There are no course pre-requirementWhat You'll LearnWhat are the critical aspects of secure developmentWhat is the CIA Triad, AAA and other security fundamentalsIdentify the correct software build requirements needed for a secure software programDetermine how to specify the proper software architecture to meet your software security requirementsUnderstand what the commonly accepted best practices are software acceptanceDetermine the proper software acquisition and supply chain requirements for your software programsGet to know the proper software testing procedure for a secure software program.RequirementsNo RequirementsCourse ContentsCourse Overview, Instructor Intro, Course PrereqsModule 1 - Core Concepts CIA Triad AAA Encryption Module 2 - Core Design Fundamentals Least Priviliages Separation of Duties Defense in Depth Whiteboard - Defense in Depth Fail Safe Economy of Mechanism Complete Mediation Open Design Least Common Mechanism Psychological Acceptability Leverage Existing Components Single Point of Failure (SPOF) Whiteboard - SPOF Course Review Course Review Questions Course Closeout
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Instructor Instroduction
Lecture 3 Course PreReqs
Section 2: Module 1 - Core Concepts
Lecture 4 Module 1 Overview
Lecture 5 CIA Triad
Lecture 6 AAA
Lecture 7 Encryption
Section 3: Module 2 - Core Design Fundamentals
Lecture 8 Module Overview
Lecture 9 Least Privelage
Lecture 10 Separation of Duties
Lecture 11 Defense in Depth
Lecture 12 Whiteboard - Defense in Depth
Lecture 13 Fail Safes
Lecture 14 Economy of Mechanism
Lecture 15 Complete Mediation
Lecture 16 Open Design
Lecture 17 Least Common Mechanism
Lecture 18 Pyschological Acceptance
Lecture 19 Leverage Existing Components
Lecture 20 Single Point of Failuer (SPOF)
Lecture 21 Whiteboard - SIngle Point of Failure
Lecture 22 Course Review
Lecture 23 Course Review Questions
Lecture 24 Course Closeout
You are a developer or software engineer and want to understand,You want to learn IT security fundamentals focused on software development
Homepage
https://www.udemy.com/course/secure-software-development-concepts-series-course-1-of-8/
Download From 1DL
https://1dl.net/5t1mi7m2b3d8/tubtf.Secure.Software.Development.Concepts..Series.Course.1.Of.8.rar
https://rapidgator.net/file/31529ce2db92cd719360ac0287511675/tubtf.Secure.Software.Development.Concepts..Series.Course.1.Of.8.rar.html
https://uploadgig.com/file/download/5601380f1a8025c9/tubtf.Secure.Software.Development.Concepts..Series.Course.1.Of.8.rar
https://nitroflare.com/view/473256297E90BBA/tubtf.Secure.Software.Development.Concepts..Series.Course.1.Of.8.rar