CSSLP Course with Hands-on Labs

Prepare for the CSSLP certification. Learn everything you need to know from the early planning stages to secure deployment and maintenance. 

(CSSLP.AO1) / ISBN : 978-1-64459-229-8
Lessons
Lab
TestPrep
AI Tutor (Add-on)
6 Reviews
Get A Free Trial

About This Course

Discover the fully-composed, CSSLP course, designed to help you conquer the exam seamlessly. Get access to over 300 collections of curated practice questions, covering all eight domains, including secure software concepts, secure software requirements & many more. 

Go beyond basic security awareness and get hands-on with threat modeling, risk management, secure coding, and security testing, just like top-tier software teams do. Then, learn to align your development process with industry standards like OWASP, NIST, and ISO. 

Skills You’ll Get

  • Secure Software Design - Apply threat modeling, attack surface reduction, and secure architecture principles during the design phase. 
  • Defensive Coding Practices - Implement secure coding techniques to prevent vulnerabilities like buffer overflows, injection attacks, and improper error handling. 
  • Risk and Compliance Management - Evaluate risks, align with regulatory standards (e.g., NIST, GDPR), and ensure secure governance across the SDLC.
  • Secure Deployment and Maintenance – Manage secure software releases, DevOps integration, patching, and ongoing operational security.
  • General Security Concepts - Understanding the security design tenets & discovering the access control modes.

1

Introduction

  • Why Focus on Software Development?
  • The Role of CSSLP
  • How to Use This Course?
  • The Examination
  • CSSLP (2020)
2

General Security Concepts

  • General Security Concepts
  • Security Models
  • Adversaries
  • Lesson Review
3

Risk Management

  • Definitions and Terminology
  • Types of Risk
  • Governance, Risk, and Compliance
  • Risk Management Models
  • Risk Options
  • Lesson Review
4

Security Policies and Regulations

  • Regulations and Compliance
  • Legal Issues
  • Privacy
  • Security Standards
  • Secure Software Architecture
  • Trusted Computing
  • Acquisition
  • Lesson Review
5

Software Development Methodologies

  • Secure Development Lifecycle
  • Secure Development Lifecycle Components
  • Software Development Models
  • Microsoft Security Development Lifecycle
  • Lesson Review
6

Policy Decomposition

  • Confidentiality, Integrity, and Availability Requirements
  • Authentication, Authorization, and Auditing Requirements
  • Internal and External Requirements
  • Lesson Review
7

Data Classification and Categorization

  • Data Classification
  • Data Ownership
  • Labeling
  • Types of Data
  • Data Lifecycle
  • Lesson Review
8

Requirements

  • Functional Requirements
  • Operational Requirements
  • Requirements Traceability Matrix
  • Connecting the Dots
  • Lesson Review
9

Design Processes

  • Attack Surface Evaluation
  • Threat Modeling
  • Control Identification and Prioritization
  • Risk Assessment for Code Reuse
  • Documentation
  • Design and Architecture Technical Review
  • Lesson Review
10

Design Considerations

  • Application of Methods to Address Core Security Concepts
  • Interfaces
  • Lesson Review
11

Securing Commonly Used Architecture

  • Distributed Computing
  • Service-Oriented Architecture
  • Rich Internet Applications
  • Pervasive/Ubiquitous Computing
  • Mobile Applications
  • Integration with Existing Architectures
  • Cloud Architectures
  • Lesson Review
12

Technologies

  • Authentication and Identity Management
  • Credential Management
  • Flow Control (Proxies, Firewalls, Middleware)
  • Logging
  • Data Loss Prevention
  • Virtualization
  • Digital Rights Management
  • Trusted Computing
  • Database Security
  • Programming Language Environment
  • Operating Systems
  • Embedded Systems
  • Lesson Review
13

Common Software Vulnerabilities and Countermeasures

  • CWE/SANS Top 25 Vulnerability Categories
  • OWASP Vulnerability Categories
  • Common Vulnerabilities and Countermeasures
  • Input Validation Failures
  • Common Enumerations
  • Virtualization
  • Embedded Systems
  • Side Channel
  • Social Engineering Attacks
  • Lesson Review
14

Defensive Coding Practices

  • Declarative vs. Programmatic Security
  • Memory Management
  • Error Handling
  • Interface Coding
  • Primary Mitigations
  • Learning from Past Mistakes
  • Lesson Review
15

Secure Software Coding Operations

  • Code Analysis (Static and Dynamic)
  • Code/Peer Review
  • Build Environment
  • Antitampering Techniques
  • Configuration Management: Source Code and Versioning
  • Lesson Review
16

Security Quality Assurance Testing

  • Standards for Software Quality Assurance
  • Testing Methodology
  • Functional Testing
  • Security Testing
  • Environment
  • Bug Tracking
  • Attack Surface Validation
  • Testing Artifacts
  • Test Data Lifecycle Management
  • Lesson Review
17

Security Testing

  • Scanning
  • Penetration Testing
  • Fuzzing
  • Simulation Testing
  • Testing for Failure
  • Cryptographic Validation
  • Regression Testing
  • Impact Assessment and Corrective Action
  • Lesson Review
18

Secure Lifecycle Management

  • Introduction to Acceptance
  • Pre-release Activities
  • Post-release Activities
  • Lesson Review
19

Secure Software Installation and Deployment

  • Secure Software Installation and Its Subsequent Deployment
  • Configuration Management
  • Lesson Review
20

Secure Software Operations and Maintenance

  • Secure Software Operations
  • The Software Maintenance Process
  • Secure DevOps
  • Secure Software Disposal
  • Lesson Review
21

Supply Chain and Software Acquisition

  • Supplier Risk Assessment
  • Supplier Sourcing
  • Software Development and Testing
  • Software Delivery, Operations, and Maintenance
  • Supplier Transitioning
  • Lesson Review

1

General Security Concepts

  • Understanding Security Design Tenets
  • Discussing About Access Control Models
  • Understanding Information Flow Models
2

Risk Management

  • Understanding Annualized Loss Expectancy
3

Security Policies and Regulations

  • Understanding Compliance-Based Assessment Regulations
  • Understanding PII and PHI
  • Understanding National Institute of Standards and Technology
4

Software Development Methodologies

  • Discussing About Software Development Methodologies
  • Understanding Secure Development Lifecycle Components
  • Understanding Software Development Models
5

Policy Decomposition

  • Understanding Access Control Mechanisms
6

Data Classification and Categorization

  • Understanding Data Classification Types
  • Understanding Data Ownership Roles
7

Requirements

  • Understanding Functional Requirements
  • Understanding the Requirements Traceability Matrix
8

Design Processes

  • Understanding Documentation
9

Design Considerations

  • Discussing About Security Design Considerations
10

Securing Commonly Used Architecture

  • Understanding Distributed Computing Terms
  • Understanding the Enterprise Service Bus
  • Understanding Cloud Service Models
11

Technologies

  • Understanding X.509 Digital Certificate Fields
  • Understanding Flow Control Technologies
  • Understanding Syslog
  • Understanding Trusted Computing Elements
12

Common Software Vulnerabilities and Countermeasures

  • Discussing About Software Vulnerabilities and Countermeasures
  • Understanding the Buffer Overflow Attack
13

Defensive Coding Practices

  • Understanding Imperative and Declarative Securities
  • Understanding Memory Management
14

Secure Software Coding Operations

  • Understanding Code Analysis Types
15

Security Quality Assurance Testing

  • Discussing About Security Quality Assurance Testing Methods
  • Understanding Functional Testing Types
  • Understanding Security Testing Types
16

Security Testing

  • Understanding the Attack Surface Analyzer
  • Understanding Regression Testing
17

Secure Lifecycle Management

  • Understanding Various Forms of Testing
18

Secure Software Installation and Deployment

  • Understanding Bootstrapping
19

Secure Software Operations and Maintenance

  • Understanding Operations/Maintenance Activities
  • Understanding the Software Disposal Process
20

Supply Chain and Software Acquisition

  • Discussing About Supplier Risk Assessment
  • Understanding Service Level Agreements

Any questions?
Check out the FAQs

  Want to Learn More?

Contact Us Now

The CSSLP is ideal for software development & security professionals responsible for applying the best practices to each phase of the SDLC.

Yes, the CSSLP certification is worth the investment for all security professionals. Hence, join our CSSLP exam preparation to build your skills and knowledge using gamified test-preps, hands-on labs, flashcards, instructional videos, and much more.

Opting between CISSP or CSSLP depends on your role. If you are a security professional, then CSSLP would be a great option for you. Whereas, if you are pursuing a more general role in security management, then the CISSP is your solution. 

CSSLP: Secure Software. Certified.

  Certify your software skills with uCertify’s CSSLP course & lead your way into application security. 

$279.99

Buy Now
scroll to top