CSSLP – Certified Secure Software Lifecycle Professional Certification Prep

Acquire essential skills for secure software development by understanding the role of security throughout all phases, including design, development, testing, integration, and deployment. Key topics include secure software design, architecture, and risk management, equipping you to create robust applications that prioritize security at every stage.
Course Details

Price:

$4,095.00

Days:

1

Location:

Virtual

Course Overview

Acquire essential skills for secure software development by understanding the role of security throughout all phases, including design, development, testing, integration, and deployment. Key topics include secure software design, architecture, and risk management, equipping you to create robust applications that prioritize security at every stage.

– • Discuss the core concepts of software security and the foundational principles that drive the construction of resilient software.
– • Discuss the security design principles as essential elements for building secure software.
– • Discuss software security standards and frameworks, roadmaps and strategies, and risk management.
– • Explain security in software development methodologies, security metrics, and security culture in software development.
– • Identify and analyze software requirements pertaining to data privacy, security, and compliance with laws and regulations.
– • Describe requirement specification and traceability, misuse and abuse cases, and flow down of security requirements to suppliers.
– • Explain secure architecture and design elements and patterns, architectural risk assessment, threat modeling, threat intelligence, and attack surface evaluation.
– • Explain security architecture and control identification, prioritization, and positioning.
– • Apply secure coding practices, analyze code for security risks, and implement security controls.
– • Discuss third-party code and libraries, software composition analysis, and security of the build process.
– • Discuss security testing strategy plans and analyze security testing methods.
– • Discuss validation and verification, security test results, and tracking security errors.
– • Describe secure software integration and deployment, security data, and post-deployment security testing.
– • Recognize various security-relevant maintenance activities and discuss planning for the continuity of operations.
– • Discuss software supply chain risks and analyze the security of third-party software.
– • Explain supplier security requirements in the acquisition process and support for contractual requirements.

No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.

• Secure Software Lifecycle and Risk Management Domain
• Secure Software Lifecycle and Risk Management Domain
• Secure Software Lifecycle and Risk Management Domain
• Secure Software Lifecycle and Risk Management Domain
• Secure Software Lifecycle and Risk Management Domain
• Chapter 1: Secure Software Concepts Domain
• Chapter 1: Secure Software Concepts Domain
• Chapter 1: Secure Software Concepts Domain
• Chapter 1: Secure Software Concepts Domain
• Chapter 1: Secure Software Concepts Domain
• Secure Software Requirements Domain
• Secure Software Requirements Domain
• Secure Software Requirements Domain
• Secure Software Requirements Domain
• Secure Software Requirements Domain
• Secure Software Architecture and Design Domain
• Secure Software Architecture and Design Domain
• Secure Software Architecture and Design Domain
• Secure Software Architecture and Design Domain
• Secure Software Architecture and Design Domain
• Secure Software Deployment, Operations and Maintenance Domain
• Secure Software Deployment, Operations and Maintenance Domain
• Secure Software Deployment, Operations and Maintenance Domain
• Secure Software Deployment, Operations and Maintenance Domain
• Secure Software Deployment, Operations and Maintenance Domain
• Secure Software Supply Chain Domain
• Secure Software Supply Chain Domain
• Secure Software Supply Chain Domain
• Secure Software Supply Chain Domain
• Secure Software Supply Chain Domain
• Applied Scenario Activities
• Applied Scenario Activities
• Applied Scenario Activities
• Applied Scenario Activities
• Applied Scenario Activities
• Secure Software Testing Domain
• Secure Software Testing Domain
• Secure Software Testing Domain
• Secure Software Testing Domain
• Secure Software Testing Domain
• Secure Software Implementation Domain
• Secure Software Implementation Domain
• Secure Software Implementation Domain
• Secure Software Implementation Domain
• Secure Software Implementation Domain

Class Dates & Times
Filters Sort results
Reset Apply
7/7/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,095.00
10/6/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$4,095.00
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.