What Is Team Management: Strategies, Duties, Job, Career Outlook
January 21, 2025
Article
This course is part of CISSP Certified Information Systems Security Professional Specialization
Instructor: Packt - Course Instructors
Included with
Recommended experience
Intermediate level
For software developers, IT managers, and security pros aiming for CISSP or integrating security into development. Basic software knowledge needed.
Recommended experience
Intermediate level
For software developers, IT managers, and security pros aiming for CISSP or integrating security into development. Basic software knowledge needed.
Apply secure coding standards to reduce vulnerabilities at the source-code level.
Conduct comprehensive application security testing and manage post-deployment risks effectively.
Implement auditing, logging, and change management processes to ensure secure software development and maintenance.
Assess the security of third-party, open-source, and cloud-based software to identify and mitigate potential risks.
Add to your LinkedIn profile
October 2024
1 assignment
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
This comprehensive course on Secure Software Development is designed to help IT professionals integrate security at every stage of the Software Development Life Cycle (SDLC), following the CISSP curriculum. The course starts with an introduction to security considerations in software development and how to choose the appropriate development methodology, including process-driven and agile-based approaches. You’ll explore the use of security controls, risk analysis, and methodologies such as the Capability Maturity Model (CMM) and Software Assurance Maturity Model (SAMM) to enhance the security of your development processes.
As the course progresses, you’ll dive into secure coding practices, exploring how to minimize programming language risks, use secure development tools, and manage post-deployment software expectations. You’ll learn how to conduct application security testing, manage software configuration, and implement auditing and logging processes to ensure security throughout the software lifecycle. Real-world scenarios will illustrate the critical role of Integrated Product Teams (IPTs) in improving communication, decision-making, and overall software quality. In addition, you’ll examine the security of APIs, cloud services, third-party software, and open-source solutions, learning how to assess and mitigate risks associated with these components. By the end of the course, you’ll have a strong understanding of how to develop, deploy, and maintain secure software, ensuring both compliance and security in modern IT environments. This course is also an excellent preparation for the CISSP certification. This course is designed for software developers, security professionals, and IT managers preparing for the CISSP certification or aiming to integrate security into software development practices. A basic understanding of software development methodologies is recommended.
This module focuses on the integration of security into the Software Development Life Cycle (SDLC) and selecting appropriate development methodologies. Learners will explore how to choose secure software development methods, including both process-driven and agile-based approaches. This module will also cover frameworks such as Capability Maturity Model (CMM) and SAMM, and the role of Integrated Product Teams (IPT) in improving the quality and security of software products. By mastering these concepts, learners will be able to implement secure practices throughout the development lifecycle.
8 videos2 readings
This module emphasizes secure coding practices, software configuration management, and application security testing within the SDLC. Learners will delve into risk analysis, mitigating programming language risks, and evaluating security in various software environments, including third-party, open-source, and cloud-based software. The module also covers API security, auditing, and logging of software changes. By mastering these areas, learners will be able to develop, deploy, and maintain secure software while managing associated risks.
14 videos1 reading1 assignment
Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Course
Course
Illinois Tech
Build toward a degree
Course
Specialization
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.