CSSLP Cert Prep: 2 Secure Software Requirements
Overview
Learn how to define and validate security requirements for applications as you prepare for the second domain of the CSSLP exam: Secure Software Requirements.
Specific, achievable security requirements are critical ingredients in the creation of any application. In this course, the second installment in the CSSLP Cert Prep series, instructor Jerod Brennen dives into the subject of security requirements to prepare you for the second domain of the Certified Secure Software Lifecycle Professional (CSSLP) exam: Secure Software Requirements. Jerod discusses how to properly define what an app must be and do in order to remain secure. He covers how to approach security, privacy, and data classification requirements for applications. Plus, he goes over how to validate your requirements, including how to use a security requirement traceability matrix (SRTM) to determine how well an app adheres to your security requirements.
Specific, achievable security requirements are critical ingredients in the creation of any application. In this course, the second installment in the CSSLP Cert Prep series, instructor Jerod Brennen dives into the subject of security requirements to prepare you for the second domain of the Certified Secure Software Lifecycle Professional (CSSLP) exam: Secure Software Requirements. Jerod discusses how to properly define what an app must be and do in order to remain secure. He covers how to approach security, privacy, and data classification requirements for applications. Plus, he goes over how to validate your requirements, including how to use a security requirement traceability matrix (SRTM) to determine how well an app adheres to your security requirements.
Syllabus
Introduction
- Determining security requirements
- Functional requirements
- Nonfunctional requirements
- Policy decomposition
- Legal, regulatory, and industry
- Security vs. privacy
- Data anonymization
- User consent
- Disposition
- Data ownership
- Labeling
- Types of data
- Data life cycle
- Misuse and abuse cases
- Software requirement specifications
- Security requirement traceability matrix
- Next steps
Taught by
Jerod Brennen
Related Courses
-
CSSLP Cert Prep: 5 Secure Software Testing
-
CSSLP Cert Prep: 3 Secure Software Design
-
CSSLP Cert Prep: 4 Secure Software Implementation
-
CSSLP Cert Prep: 1 Secure Software Concepts
-
CSSLP Cert Prep: 6 Secure Lifecycle Management
-
Requirements Gathering for Secure Software Development
University of Colorado System
Reviews
0.0 rating, based on 0 reviews