We may earn an affiliate commission when you visit our partners.
Course image
Kevin Henry, Joshua Kinney, and Delano Athias

Many software development projects and applications written today are vulnerable to attack or compromise and lack effective security and compliance controls. Why? Most applications are built with a focus on functionality and the need to support business operations, rather than being built to be secure.In this series, you will learn the foundational concepts of security in relation to application development and the software development lifecycle. Next, you will learn how to address the business functionality and security requirements for new and modified software. Finally, you will learn how to ensure that software is designed and developed to operate securely, and remain secure even as changes are made in the software itself or in its operational environment.

Read more

Many software development projects and applications written today are vulnerable to attack or compromise and lack effective security and compliance controls. Why? Most applications are built with a focus on functionality and the need to support business operations, rather than being built to be secure.In this series, you will learn the foundational concepts of security in relation to application development and the software development lifecycle. Next, you will learn how to address the business functionality and security requirements for new and modified software. Finally, you will learn how to ensure that software is designed and developed to operate securely, and remain secure even as changes are made in the software itself or in its operational environment.

What You'll Learn

  • Protecting data and business assets and complying with laws and regulations
  • Following coding standards and how documentation can help in the maintenance and operations of software
  • Developing test plans and scripts
  • Identifying software vulnerabilities and how to perform testing of units of code
  • Managing each phase of the software development lifecycle
  • Tailoring security to meet environmental risk and operational challenges
  • Supporting incident response, patch and vulnerability management, and continuity of operations
  • Supporting the software acquisitions process
  • Enroll now

    Share

    Help others find this collection page by sharing it with your friends and followers:

    What's inside

    Save this collection

    Save CSSLP® (Certified Secure Software Lifecycle Professional) to your list so you can find it easily later:
    Save
    Our mission

    OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

    Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

    Find this site helpful? Tell a friend about us.

    Affiliate disclosure

    We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

    Your purchases help us maintain our catalog and keep our servers humming without ads.

    Thank you for supporting OpenCourser.

    © 2016 - 2024 OpenCourser