A Quick Glance

The CSSLP course under Windows Server training provides the in-depth knowledge required to clear Certified Secure Software Lifecycle (CSSLP) exam. This course will help the delegates in understanding all the phases included in the software lifecycle phases. Pearce Mayfield's CSSLP Boot Camp is the best training for validating someone's ability in integrating security in life cycle phases. The training program equips the delegates with the competencies, tools and processes for incorporating security into every stage of the software lifecycle.  The course introduces a broad range of technical skills for understanding security control processes and establish workflows across development and management of security policy.

  • black-arrow

    Get to know about software lifecycle security

  • black-arrow

    Understand the key concepts and terminologies used in the life cycle

  • black-arrow

    We offer the best price in the industry

  • black-arrow

    Our training programs are executed in luxury venues

  • black-arrow

    Our courses are delivered by highly experienced and certified instructors

  • To attend CSSLP Boot Camp course, the delegate must have four-year experience in software development lifecycle area.
  • One must have minimum four years of the degree, paid one, full-time experience of  Software  Development Lifecycle (SDLC) professional course.
  • Either In one or all of the eight domains of the CSSLP Common Body of Knowledge (CBK)
  • After getting a four-year college degree or equivalent to the regional course will waive one year of the required experience but it helps to get an Only one-year exemption for education.
  • In case you don’t have the required work experience yet? As a substitute, You can take the CSSLP exam successfully to earn an Associate of (ISC)² designation. Then also you’ll get a chance to earn five years your required work experience for the CSSLP.

This course is best suited for the following audience:

  • Software developers
  • Business Analysts
  • Project Manager Team Leads
  • Architects
  • Project Managers
  • Software QA
  • Security Specialists
  • Developers and Coders
  • Auditors
  • Technical Architects
  • Engineers

Key Learning Points


Tutor Support

After the training, the delegates will:

  • Learn about the skills required to efficiently run assessments for cyber-cyber supply
  • Get to know about the security and functional testing
  • Able to mitigate the vulnerability threats of the applications
  • Learn the concepts to reduce reputational and revenue loss occurring from insecure software
  • Recognise various programming skills for detecting the weakness of the software system
  • Learn how to minimize production costs and delivery delays
  • Identify the system which is reliable, resilient and recoverable
  • Aids in enhancing the credibility of the organization and its development team
  • Ensure compliance with industry regulation and government norms

Course Overview

There are seven domains of the CSSLP natural body of knowledge that are covered in this training. The seven domains are discussed below:

Secure Software Concepts: This covers the basic software requirements and fundamental design principles and core concepts including risk and compliance, security design principles and software development methodologies

Security Software Requirement: This provides knowledge regarding secure identification of key security objectives and development of security controls reducing disruption to plans and schedules

Secure Software Design: This covers design processes and considerations converting security requirements into application design elements.

Secure Software Coding and Implementation: In this, the programming concepts are elaborated that are helpful in detecting the vulnerability of a system by involving testing and coding standards

Software Testing: This covers testing artefacts including types of testing, security and quality assurance and test data lifecycle management

Software Acceptance: This includes requirements needed for the software acceptance and assurance including risk acceptance and documentation and methods of independent testing

Software Deployment and Disposal: This includes the installation and maintenance of software

Supply Chain and Software Acquisition: This covers the method of how to perform the practical assessment in the organization and managing risk during acquisition and procurement of software. This includes software development test and supplier risk assessment and supplier transitioning


Course Content

An Overview of Software Concepts

  • Procedures and implications with centralised and decentralised environments
  • Procedures of Security Design
  • What is software development?

Requirements of Security Software:

  • An Overview of security controls
  • Classifying and categorising data
  • Functional and operational requirements

An Introduction to Secure Software Design

  • Implementing requirements into design
  • Describing design process and design requirements
  • An overview of threat modelling

Secure Software Coding

  • What are coding and testing standards?
  • The types of security tools

Secure Software Testing

  • Testing for Security and Quality Assurance
  • Various types of Testing
  • Influence Assessment and Corrective Action
  • Lifecycle Management data tests

Software Acceptance

  • What are risks?
  • Self-governing Testing Methods

Supply Chain and Software Acquisition

  • What is Supplier Sourcing?
  • The summary of software delivery
  • Assessing risks

CSSLP Boot Camp Enquiry


Enquire Now

----- OR -------

Reach us at 01865522447 or info@pearcemayfield.com for more information.