Booking options
£74.99
£74.99
On-Demand course
2 hours 52 minutes
All levels
This course helps you prepare for your CISSP certification. In this course, we will be discussing CISSP? Certification Domain 8 - Software Development Security. This course focuses on how to secure software as we develop it. Domain 8 makes up 11% of the exam questions.
The CISSP certification is the gold standard for IT security certifications, with over 120,000 open CISSP jobs in the US, and an average CISSP salary in the US of over $125,000. The exam covers eight domains; in this course, we will be covering Domain 8, with respect to the May 2021 exam update. This course focuses on how we secure software as we develop it. In Domain 8, we will understand and integrate security in the Software Development Life Cycle (SDLC), then identify and apply security controls in software development ecosystems. Post that, we will assess the effectiveness of software security and cover the security impact of acquired software. Then we will define and apply secure coding guidelines and standards. We will also cover OWASP top 10 as per 2021 and other software vulnerabilities, different software development maturity models, third-party software security, and AI (Artificial Intelligence). The course also includes 30 practice questions to test our learning from the course. By the end of this course, you will be prepared for Domain 8 of the CISSP exam. The complete study guide for this course is available at https://github.com/PacktPublishing/CISSP-Certification-Domain-8-Software-Development-Security-Video-Boot-Camp-2022
Understand and integrate security in the SDLC
Identify and apply security controls in software development ecosystems
Assess the effectiveness of software security
Assess security impact of acquired software
Define and apply secure coding guidelines and standards
Test and secure software that is bought from third parties
This course is for anyone who wants to learn more about CISSP certification or about CISSP Domain 8: Software Development Security.
This is also useful for anyone who wants to grow their IT security and cyber security knowledge and are new or experienced IT security professionals, or for professionals who need CEUs/PDUs for other certifications.
This course covers all the concepts of software development security, which covers 10% of the CISSP exam. You will also be able to practice a few quiz questions similar to the ones that you will face in the CISSP exam.
Prepare for the latest version of the CISSP certification exam (the next CISSP update is in 2024) * Gain a clear understanding of CISSP Domain 8 (Software Development Security) * 30 practice questions shared
https://github.com/PacktPublishing/CISSP-Certification-Domain-8-Software-Development-Security-Video-Boot-Camp-2022
Thor Pedersen teaches IT, cybersecurity, and project management, both online and in-person, through his training company-Thor Teaches. His current certifications include CISSP, PMP, CISM, CDPSE, CEH, CompTIA Security+, CCNP R/S, CCNP Enterprise, CCNA R/S, CCNA-Security, CCENT, and 4011 Certified Recognition.
1. Introduction
This section provides an introduction to the course.
1. Introduction This video provides an introduction to the author of this course. |
2. Tips and Tricks In this video, we will cover some tips and tricks that will help you make the best of this course. |
2. CISSP Domain 8 - Software Development Security
In this section, you will learn about CISSP Domain 8 and software development security.
1. What We will Be Covering In this video, we will understand what we are going to cover in Domain 8 of the CISSP exam. |
2. Designing Security into Our Software In this video, we will be designing security into our software. |
3. Programming Concepts - Part 1 In this video, we will cover some important programming concepts such as machine code, source code, bytecode, OOP (Object-Oriented Programming), and more. |
4. Programming Concepts - Part 2 In this part 2 video, we will cover top-down and bottom-up programming, and also understand different types of software release and software licenses. |
5. Software Development Methodologies - Part 1 In this video, we will cover software development methodologies such as waterfall, Sashimi Model, and Agile software development. |
6. Software Development Methodologies - Part 2 In this video, we will cover Scrum, XP (Extreme Programming), the Spiral Model, RAD, and prototyping. |
7. Software Development Methodologies - Part 3 In this video, we will cover software development methodologies such as SDLC, projects, programs and portfolios, and IPT. |
8. Software Development Methodologies - Part 4 In this video, we will cover source code escrow, source code repositories, API security (Application Programming Interface), and software change and configuration management. |
9. DevOps and DevSecOps In this video, we will cover DevOps and DevSecOps in detail. |
10. Databases - Part 1 In this video, we will understand what a database is, what it does, and how it works. |
11. Databases - Part 2 In this video, we will continue with Integrity. Then, we will cover database normalization, database views, and data dictionary. |
12. Databases - Part 3 In this video, we will cover database query language, hierarchical databases, and object-oriented databases (object database management systems). |
13. Databases - Part 4 In this video, we will cover coupling, cohesion, ORB (Object Request Broker), OOAD (Object-Oriented Analysis and Design) and the ACID model (Atomicity, Consistency, Isolation, and Durability). |
14. OWASP - Part 1 In this video, we will cover OWASP A1 to A2. |
15. OWASP - Part 2 In this video, we will cover OWASP A3 to A6. |
16. OWASP - Part 3 In this video, we will cover OWASP A7 to A9. |
17. OWASP - Part 4 In this video, we will cover OWASP A10 and more. |
18. Software Vulnerabilities and Attacks In this video, we will cover software vulnerabilities and attacks such as buffer overflow, race condition, backdoors, ethical disclosure, and more. |
19. Maturity Models In this video, we will cover CMM (Capability Maturity Model), Software Assurance Maturity Model (SAMM), and acceptance testing. |
20. Buying Software from Other Companies In this video, we will understand how to buy software from other companies. |
21. Artificial Intelligence (AI) In this video, we will cover Artificial Intelligence (AI). |
122. What We Covered in Domain 8 In this video, we will be wrapping up Domain 8; in this domain, you learned how we can design security into our software as we develop it. |