Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Certification Academy
  4. CSSLP Certification Boot Camp

CSSLP Certification Boot Camp

Certification Academy's Certified Secure Software Lifecycle Professional (CSSLP) Boot Camp is designed to equip you with the knowledge and skills needed to apply security best practices throughout the software development lifecycle, from design and implementation to testing and deployment.

This comprehensive training focuses on integrating security practices into every phase of the development process, covering essential policies, procedures, and best practices for secure software development. You will learn how to effectively manage software security risks and enhance the security posture of your applications. By the end of the boot camp, you will be fully prepared to earn your CSSLP certification, proving your ability to develop, implement, and manage secure software development practices and mitigate cyber threats in real-world environments.

Provider Information

More courses from this provider:
Contact Information

Certification Academy
3104 E Camelback Rd, #2080
Phoenix, AZ 85016

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Catalog Number
CACS103
Course Prerequisites

In order to obtain the CSSLP certification, you must have at least four years of professional Software Development Lifecycle (SDLC) experience and a work history reflecting direct experience in at least one of the eight domains listed in the (ISC)2 CSSLP Common Body of Knowledge (CBK). However, you can become an Associate of (ISC)2 by passing the exam without the required work experience.

Training Purpose
Functional Development
Skill Development
Specific Audience
All
Delivery Method
Online, Instructor-Led
Online, Self-Paced
  • Online, Instructor-Led
  • Online, Self-Paced

Learning Objectives

The CSSLP Boot Camp is designed to equip participants with the knowledge and skills necessary to integrate security best practices throughout the software development lifecycle. This training focuses on key areas that are essential for developing, managing, and securing software in today's dynamic threat environment. By the end of the course, participants will be fully prepared to earn their CSSLP certification, demonstrating their expertise in secure software development.

Learning Objectives:

Secure Software Concepts
Gain a thorough understanding of core security concepts and secure design principles to effectively control the behavior, usage, and content of software systems.

Secure Software Requirements
Learn to identify, document, and address both functional and non-functional security requirements during the requirements gathering phase of software development.

Secure Software Architecture and Design
Develop the ability to translate security requirements into detailed design elements within application architecture.

Secure Software Implementation
Apply secure coding standards and utilize testing tools to prevent the introduction of security vulnerabilities during the software implementation phase.

Secure Software Testing
Evaluate the security functionality of software and its ability to withstand various types of attacks, ensuring robustness and reliability.

Secure Software Lifecycle Management
Strengthen the overall security posture of software by managing security risks and practices throughout the entire software lifecycle.

Secure Software Deployment, Operations, and Maintenance
Address key security challenges associated with the deployment, operation, and maintenance of software, focusing on steady-state operations and security management.

Secure Software Supply Chain
Explore strategies for managing risks related to outsourced software development, acquisition, and procurement, ensuring that supply chain security is effectively maintained.

By focusing on these learning objectives, participants will build the expertise required to secure software from development through deployment, positioning themselves as leaders in secure software lifecycle management.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov(link sends email). Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date:

You have been selected to participate in a brief survey about your experience today with National Initiative for Cybersecurity Careers and Studies.

Would you like to participate in our survey?

If you accept you will be leaving the National Initiative for Cybersecurity Careers and Studies website and going to a third party site.
That site may have different privacy, security and accessibility policies than the National Initiative for Cybersecurity Careers and Studies site.
National Initiative for Cybersecurity Careers and Studies does not endorse any commercial products, services, programs or content on the third party website.
Thank you for visiting our site. We hope your visit was informative and enjoyable.