Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/joeyhage/csslp-notes
https://github.com/joeyhage/csslp-notes
csslp
Last synced: 6 days ago
JSON representation
- Host: GitHub
- URL: https://github.com/joeyhage/csslp-notes
- Owner: joeyhage
- License: mit
- Created: 2021-04-23T18:46:24.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2024-01-17T03:08:50.000Z (11 months ago)
- Last Synced: 2024-12-19T23:43:47.761Z (6 days ago)
- Topics: csslp
- Homepage: https://joeyhage.github.io/csslp-notes/
- Size: 1.05 MB
- Stars: 36
- Watchers: 6
- Forks: 15
- Open Issues: 8
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# Certified Secure Software Lifecycle Professional in bullet points
[![Quality checks status](https://github.com/joeyhage/csslp-notes/workflows/Quality%20checks/badge.svg)](https://github.com/joeyhage/csslp-notes/actions)
- This repo contains study notes for Certified Secure Software Lifecycle Professional (CSSLP) exam.
- Good luck & enjoy studying! ☕
- Contributions of any kind are welcome!## Symbols
- There are some symbols used throughout the documentation: (TODO)
| Symbol | Description |
| :----: | -------------------------------------------------- |
| 💡 | Best practice or practical tips |
| ❗ | An important limitation, challenge or an exception |
| 📝 | Common exam area |## Content
1. Secure Software Concepts
1. [General Security Concepts](./notes/01-Secure-Software-Concepts/01-General-Security-Concepts.md)
2. [Risk Management](./notes/01-Secure-Software-Concepts/02-Risk-Management.md)
3. [Security Policies and Regulations](./notes/01-Secure-Software-Concepts/03-Security-Policies-and-Regulations.md)
4. [Software Development Methodologies](./notes/01-Secure-Software-Concepts/04-Software-Development-Methodologies.md)
2. Secure Software Requirements
1. [Policy Decomposition](./notes/02-Secure-Software-Requirements/01-Policy-Decomposition.md)
2. [Data Classification and Categorization](./notes/02-Secure-Software-Requirements/02-Data-Classification-and-Categorization.md)
3. [Requirements](./notes/02-Secure-Software-Requirements/03-Requirements.md)
3. Secure Software Design
1. [Design Processes](./notes/03-Secure-Software-Design/01-Design-Processes.md)
2. [Design Considerations](./notes/03-Secure-Software-Design/02-Design-Considerations.md)
3. [Securing Commonly Used Architecture](./notes/03-Secure-Software-Design/03-Securing-Commonly-Used-Architecture.md)
4. [Technologies](./notes/03-Secure-Software-Design/04-Technologies.md)
4. Secure Software Implementation/Programming
1. [Common Software Vulnerabilities and Countermeasures](./notes/04-Secure-Software-Implementation-Programming/01-Common-Software-Vulnerabilities-and-Countermeasures.md)
2. [Defensive Coding Practices](./notes/04-Secure-Software-Implementation-Programming/02-Defensive-Coding-Practices.md)
3. [Secure Software Coding Operations](./notes/04-Secure-Software-Implementation-Programming/03-Secure-Software-Coding-Operations.md)
5. Secure Software Testing
1. [Security Quality Assurance Testing](./notes/05-Secure-Software-Testing/01-Security-Quality-Assurance-Testing.md)
2. [Security Testing](./notes/05-Secure-Software-Testing/02-Security-Testing.md)
6. Secure Lifecycle Management
1. [General Security Concepts](./notes/06-Secure-Lifecycle-Management/01-Secure-Lifecycle-Management.md)
7. Software Deployment, Operations, and Maintenance
1. [Secure Software Installation and Deployment](./notes/07-Software-Deployment-Operations-Maintenance/01-Secure-Software-Installation-and-Deployment.md)
2. [Secure Software Operations and Maintenance](./notes/07-Software-Deployment-Operations-Maintenance/02-Secure-Software-Operations-and-Maintenance.md)
8. Supply Chain and Software Acquisition
1. [Supply Chain and Software Acquisition](./notes/08-Supply-Chain-Software-Acquisition/01-Supply-Chain-and-Software-Acquisition.md)
9. [Terms](./notes/09-Terms/Terms.md)
10. [Outline](./notes/10-Outline/Outline.md)[↑](#content)