Font size:

CSSLP video collection

152 videos    $99.00
Title Author Info
Agile Neil McIsaac 4 minutes
Anti-tampering Techniques Glen E. Clarke 7 minutes
Applicable Methods to Address Core Security Concepts Neil McIsaac 6 minutes
Attack Surface Evaluation Neil McIsaac 6 minutes
Attack Surface Validation Glen E. Clarke 2 minutes
Authentication and Authorization Part 1 Neil McIsaac 6 minutes
Authentication and Authorization Part 2 Neil McIsaac 5 minutes
Authentication and Identity Management Neil McIsaac 7 minutes
Backup; Recovery; and Archiving Glen E. Clarke 4 minutes
Bootstrapping Glen E. Clarke 2 minutes
Bug Tracking Glen E. Clarke 6 minutes
Build Environment Glen E. Clarke 4 minutes
Change Management Glen E. Clarke 3 minutes
Cloud Architectures Neil McIsaac 7 minutes
Code Analysis Glen E. Clarke 4 minutes
Code Escrow and Data Exports Chuck Easttom 5 minutes
Code Reuse Plan Best Practice Chuck Easttom 7 minutes
Complete Mediation Neil McIsaac 3 minutes
Completion Criteria Glen E. Clarke 6 minutes
Concurrency Glen E. Clarke 3 minutes
Configuration Management Process Glen E. Clarke 4 minutes
Configuration Management Roles and Plan Glen E. Clarke 4 minutes
Configuration Parameter Management Glen E. Clarke 5 minutes
Continuous Testing Glen E. Clarke 3 minutes
Contracts Chuck Easttom 5 minutes
Contractual Integrity Controls Chuck Easttom 3 minutes
Control Identification and Prioritization Neil McIsaac 5 minutes
Corrective Action Glen E. Clarke 3 minutes
Credential Management Neil McIsaac 6 minutes
Cryptographic Validation Glen E. Clarke 5 minutes
Code Testing and Verification Chuck Easttom 3 minutes
Embedded Systems Neil McIsaac 4 minutes
Cryptology Glen E. Clarke 5 minutes
CWE Glen E. Clarke 4 minutes
Data Classification (Part 1) Neil McIsaac 6 minutes
Data Classification (Part 2) Neil McIsaac 4 minutes
Data Lifecycle Neil McIsaac 5 minutes
Data Loss Prevention Neil McIsaac 4 minutes
Data Ownership Neil McIsaac 3 minutes
Database Security Neil McIsaac 5 minutes
Declarative Security Neil McIsaac 4 minutes
Deployment Environment Neil McIsaac 4 minutes
Deployment Requirements Neil McIsaac 4 minutes
Design and Architecture Technical Review Neil McIsaac 3 minutes
Digital Rights Management (DRM) Neil McIsaac 3 minutes
Economy of Mechanism Neil McIsaac 3 minutes
Environment Glen E. Clarke 3 minutes
Exception Management Glen E. Clarke 5 minutes
External Requirements Neil McIsaac 3 minutes
Fail-Safe Neil McIsaac 3 minutes
Failure Testing Glen E. Clarke 3 minutes
Flow Control Neil McIsaac 5 minutes
Fuzzing Glen E. Clarke 3 minutes
Impact Assessment Glen E. Clarke 2 minutes
Independent Testing Glen E. Clarke 4 minutes
Integrating with Existing Architectures Neil McIsaac 4 minutes
Intellectual Property Chuck Easttom 5 minutes
Interconnectivity Neil McIsaac 5 minutes
Internal Requirements Neil McIsaac 5 minutes
Labeling Neil McIsaac 4 minutes
Least Common Mechanism Neil McIsaac 4 minutes
Least Privilege Neil McIsaac 4 minutes
Legal Neil McIsaac 6 minutes
Legal Compliance Chuck Easttom 5 minutes
Logging and Auditing Glen E. Clarke 6 minutes
Managed Services Controls Chuck Easttom 3 minutes
Management Requirements Neil McIsaac 4 minutes
Memory Management Glen E. Clarke 5 minutes
Mobile Applications Neil McIsaac 3 minutes
Monitoring and Incident Management Chuck Easttom 5 minutes
Objects; Activities; and Actions Neil McIsaac 4 minutes
Open Design Neil McIsaac 4 minutes
Operating Systems Neil McIsaac 3 minutes
Operations Requirements Neil McIsaac 4 minutes
Output Sanitization Glen E. Clarke 5 minutes
OWASP Top 10 Glen E. Clarke 8 minutes
Peer-based Code Review Glen E. Clarke 6 minutes
Penetration Glen E. Clarke 9 minutes
Pervasive and Ubiquitous Computing Neil McIsaac 7 minutes
Post-release Plan Glen E. Clarke 4 minutes
Pre-release Testing Process Glen E. Clarke 5 minutes
Privacy Considerations Neil McIsaac 6 minutes
Problem Management Glen E. Clarke 3 minutes
Product Deployment and Sustainment Controls Chuck Easttom 3 minutes
Programmatic Security Glen E. Clarke 4 minutes
Programming Language Environment Neil McIsaac 6 minutes
Psychological Acceptability Neil McIsaac 3 minutes
Publishing and Dissemination Controls Chuck Easttom 4 minutes
Regression Testing Glen E. Clarke 3 minutes
Regulations and Compliance Neil McIsaac 5 minutes
Release Management Glen E. Clarke 2 minutes
Rich Internet Applications Neil McIsaac 6 minutes
Risk Acceptance Glen E. Clarke 7 minutes
Risk Assessment for Code Reuse Neil McIsaac 3 minutes
Role and User Definitions Neil McIsaac 4 minutes
Safe APIs Glen E. Clarke 3 minutes
Scanning Glen E. Clarke 5 minutes
Security Design Principles Neil McIsaac 5 minutes
Security Testing Controls Chuck Easttom 5 minutes
Separation of Duties Neil McIsaac 3 minutes
Sequencing and Timing Requirements Neil McIsaac 6 minutes
Service-level Agreements Chuck Easttom 5 minutes
Service-Oriented Architecture Neil McIsaac 5 minutes
Session Management Glen E. Clarke 4 minutes
Simulation Testing Glen E. Clarke 3 minutes
Software Authenticity and Integrity Chuck Easttom 4 minutes
Software Disposal Execution Glen E. Clarke 5 minutes
Software Disposal Planning Glen E. Clarke 4 minutes
Software Requirements Verification and Validation Chuck Easttom 4 minutes
Source Code and Versioning Glen E. Clarke 4 minutes
Standards Glen E. Clarke 5 minutes
Supplier Prequalification Chuck Easttom 5 minutes
Supplier Sourcing Challenges Chuck Easttom 6 minutes
System-of-Systems Integration Chuck Easttom 4 minutes
Technical Controls Chuck Easttom 3 minutes
Test Data Lifecycle Management Glen E. Clarke 2 minutes
Testing Artifacts Glen E. Clarke 4 minutes
The Privacy Principle Neil McIsaac 4 minutes
Threat Modeling and Documentation Neil McIsaac 5 minutes
Tokenizing Glen E. Clarke 2 minutes
Trusted Computing Neil McIsaac 6 minutes
Type Safety Glen E. Clarke 3 minutes
Validation and Verification Glen E. Clarke 5 minutes
Vendor Technical Integrity Controls Chuck Easttom 6 minutes
Vulnerability Management; Tracking; and Resolution Chuck Easttom 3 minutes
Waterfall Neil McIsaac 5 minutes
Weakest Link Neil McIsaac 3 minutes
Standards Neil McIsaac 4 minutes
Availability Neil McIsaac 4 minutes
Error Handling Glen E. Clarke 5 minutes
Leveraging Existing Components Neil McIsaac 3 minutes
Interfaces Neil McIsaac 4 minutes
Defense in Depth Neil McIsaac 3 minutes
Chain of Custody Chuck Easttom 5 minutes
Incident Management Glen E. Clarke 6 minutes
Sandboxing Glen E. Clarke 2 minutes
Monitoring Glen E. Clarke 4 minutes
Risk Management Neil McIsaac 5 minutes
Risk Assessment for Code Reuse Chuck Easttom 5 minutes
Functional Testing Glen E. Clarke 3 minutes
Nonfunctional Testing Glen E. Clarke 4 minutes
Security Testing Glen E. Clarke 6 minutes
Configuration Glen E. Clarke 5 minutes
Confidentiality Neil McIsaac 6 minutes
Integrity Neil McIsaac 6 minutes
Input Validation Glen E. Clarke 6 minutes
Virtualization Neil McIsaac 4 minutes
Data Types Neil McIsaac 5 minutes
Accounting Neil McIsaac 3 minutes
Distributed Computing Neil McIsaac 5 minutes
Non-Repudiation Neil McIsaac 4 minutes
Logging Neil McIsaac 3 minutes
Register Now
CSSLP video collection
  • Course ID:
    262966
  • Duration:
    n/a
  • Price:
    $99