" />
Shopping Cart  [0]

Call 800.698.5501

CSSLP Certification - Certified Secure Software Lifecycle Professional CSSLP Training Boot Camp

CSSLP Training Camp
TrainingCamp Twitter Feed
CSSLP Training

Our 6 Day CSSLP Certification Training Camp is the only Official (ISC)² Exam Prep Boot Camp which covers how to incorporate security practices — authentication, authorization and auditing — into each phase of the software development lifecycle (SDLC).

Led by (ISC)² authorized instructors, our CSSLP training course provides a comprehensive review of information security concepts and industry best practices, covering the 8 domains of the CSSLP CBK, and Training Camp's award-winning comprehensive exam preparation best practices.

In addition to our public course schedule which offers a class almost every week, we can also offer Private Group Training hosted at any location in the world, with no student minimum number.

Enrollment Information

CSSLP Training Pricing View Pricing
CSSLP Certification Schedule Course Schedule

CSSLP Boot Camp

Duration: 6 days
Exam Voucher: Included
GSA Catalog: GS-02F-0044T

Other Delivery Formats

Hosted CSSLP Boot Camp Private Group Training
CSSLP Certification Training
CSSLP Certification Training Details

  • 6 Days Instruction w/ Onsite Testing
  • 100% Exam Pass Guarantee
  • Training Camp's Exam Preparation Study Guide
  • Official (ISC)2 Guide to the CSSLP CBK
  • (ISC)² CPE for CISSP

  • Official (ISC)² CISSP Exam Voucher
  • Official (ISC)² Training Courseware
  • Official (ISC)² Flash Cards
  • Official (ISC)² Practice Exam
  • Official (ISC)² Evening Review

  • (ISC)2 Partner Award Winner
    Having trained and certified over 20,000 CISSPs globally, Training Camp has been awarded numerous awards from (ISC)² for over ten years. Our decade-long partnership with (ISC)² demonstrates Training Camp's experience and expertise delivering information security certification training across their full portfolio of certifications.

    CSSLP Certification Leader

    Training Camp is the only approved accelerated training partner for (ISC)². We are held to the highest level of quality assurance for all of our (ISC)² program offerings.

    CSSLP Instructors
    (ISC)² Approved CSSLP Certified Instructors

    We utilize Authorized (ISC)² instructors who are Subject Matter Experts well-versed in accelerated learning and exam preparation during our CSSLP boot camp. Their delivery accommodates every student's learning needs through individualized instruction, lab partner and group exercises, independent study, self-testing, and question/answer drills.

    CSSLP Courseware
    Customized 100% Updated Exam Preparation Study Guide
    *Training Camp Exclusive Feature

    Our award-winning comprehensive exam preparation best practice guide book is designed with extensive work from (ISC)² Instructors, Training Camp Subject Matter Experts, and feedback from the contributions from (ISC)² members.

    CSSLP Certification Practice Tests
    Detailed Evening Review & Official (ISC)² Practice Exam
    *Training Camp Exclusive Feature

    This zero-distraction, accelerated CSSLP boot camp review includes value-added evening review sessions & official (ISC)² practice exams - representative of the actual exam questions from (ISC)², and key to CSSLP preparation.

    CSSLP Candidate
    The course is intended for students who have at least four years of direct full-time secure software lifecycle professional work experience in one or more of the 8 domains of the CSSLP CBK, or three years of direct full-time secure software lifecycle professional work experience in one or more of the eight domains of the CSSLP CBK with a four-year college degree in an information technology discipline. The course builds on and brings together the holistic view of the topics covered in the everyday environment of an information assurance professional.
    Training on your terms.

    Training Camp offers the full spectrum of learning [delivery] options - providing our customers with end-to-end solutions to assist in achieving education goals.

    Instructor-Led Boot Camps
    Check out our full listing of Training Camp course programs, offered at nationwide locations.

    Onsite Training [Worldwide]
    Training Camp offers Official (ISC)² CSSLP training with supported examination delivery anywhere in the world.

    Self-Paced Online
    Learn CSSLP at your own pace, at home, on mobile, anywhere you have access to the internet and a web browser.

    CSSLP Course Outline

    Secure Software Concepts

    Security implications and methodologies within centralized and decentralized environments across the enterprise’s computer systems in software development:

    Core Concepts - Security Design Principles - Privacy - Governance, Risk and Compliance - Software Development Methodologies

    Secure Software Requirements

    Capturing security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules:

    Policy Decomposition - Data Classification & Categorization - Functional Requirements - Operational Requirements

    Secure Software Design

    Translating security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria:

    Design Processes - Design Considerations - Securing Commonly Used Architecture - Technologies

    Secure Software Implementation/Coding

    Involves the application of coding and testing standards, applying security testing tools including ‘fuzzing’, static-analysis code scanning tools, and conducting code reviews:

    Declarative versus Imperative (Programmatic) Security - Vulnerability Database / Lists - Defensive Coding Practices and Controls - Source Code and Versioning - Development and Build Environment - Code / Peer Review - Code Analysis - Anti-tampering Techniques

    Secure Software Testing

    Integrated QA testing for security functionality and resiliency to attack:

    Testing Artifacts - Testing for Security and Quality Assurance - Types of Testing - Impact Assessment and Corrective Action - Test Data Lifecycle Management

    Software Acceptance

    Security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, Common Criteria and methods of independent testing:

    Pre-Release or Pre-Deployment - Post-Release

    Software Deployment, Operations, Maintenance and Disposal

    Security issues around steady state operations and management of software. Security measures that must be taken when a product reaches its end of life:

    Installation and Deployment - Operations and Maintenance - Software Disposal

    Supply Chain & Software Acquisition

    Provides a holistic outline of the knowledge and tasks required in managing risk for outsourced development, acquisition, and procurement of software and related services:

    Supplier Risk Assessment - Supplier Sourcing - Software Development Test - Software Delivery, Operations & Maintenance - Supplier Transitioning