The document outlines the topics covered in a course on secure software development. It discusses secure software concepts, requirements, design, implementation, testing, deployment and maintenance. It also covers standards, methodologies, regulations and cryptography relevant to developing secure software.
Introduction to CSSLP course and outline of topics covering secure software concepts and practices.
Identifying organizations addressing software security, including IEEE, SANS, ISSECO, and DHS certifications.
Introduction to core concepts of secure software, emphasizing the importance of holistic security and its challenges.
Discussion on the Iron Triangle of project constraints, cost of software defects, and the importance of security in product quality.
Details on security profiles: authentication, authorization, availability, and an overview of risk management standards.
Various types of security standards including internal, external, governmental, and the methodologies applied in secure software development.
Relevant compliance regulations like HIPAA, GLB, and security models governing trust computing.
Essential security requirements including availability, confidentiality methods, and how to ensure data protection.
Different types of access control models such as DAC, MAC, RBAC, and their implementation in protecting assets.
Discussion on techniques for identifying assets that need protection and the frameworks used for guidance.
Overview of cryptography types, including symmetric and asymmetric algorithms, and methods ensuring data integrity.
Design principles in software architecture including availability design and various interface considerations.
Types of malware and discussion around cloud security and mobile architecture decisions.
Lists of organizations for tracking application bugs and security advisories, including OWASP Top 10.Final discussion on secure software processes including code analysis and review within the acquisition lifecycle.