Training Type
Language
Filtered By:
ENG 190

(Coming Soon) Implementing the MS SDL Process Into your SDLC

This series introduces the fundamentals of the Microsoft Security Development Lifecycle (SDL) process and covers the security requirements for each phase your SDLC. Agile SDL variation, the Security Development Lifecycle for Line-of-Business Applications (SDL-LOB), and the Microsoft SDL Threat Modeling tool.

E-Learning English
ENG 191

(Coming Soon) Introduction to the Microsoft SDL

This course describes the main phases of the Microsoft Security Development Lifecycle (SDL) process, namely Requirements, Design, Implementation, Verification, and Release, with a focus on security throughout. After completing this course, you will be able to list the phases of the Microsoft SDL process, and describe the required and recommended tasks for each phase of the process

E-Learning English
ENG 192

(Coming Soon) Implementing the Agile MS SDL

This course describes the Agile variation of the Microsoft Security Development Lifecycle (SDL) process. The standard MS SDL process follows the traditional incremental waterfall model, while Agile methodologies are more iterative. SDL-Agile maps critical security practices into every-sprint requirements, bucket or periodic requirements, and one-time requirements.

E-Learning English
ENG 193

(Coming Soon) Implementing the MS SDL Optimization Model

This course introduces the Microsoft Security Development Lifecycle (SDL) Optimization Model and how to use it.

E-Learning English
ENG 194

(Coming Soon) Implementing MS SDL Line of Business

This course describes the Microsoft Security Development Lifecycle for Line of Business (SDL-LOB), aimed at development of internal or business-facing applications. Important activities include security training, risk assessment, and the typical software lifecycle phases: Requirements, Design, Implementation, Verification, and Release.

E-Learning English
ENG 195

(Coming Soon) Implementing the MS SDL Threat Modeling Tool

This course describes the features of the Microsoft SDL Threat Modeling tool, which complements the Microsoft SDL Threat Modeling process. While not required to perform threat modeling, use of the tool aids teams with the creation of threat models and helps enumerate threats using STRIDE.

E-Learning English
ENG 211

How to Create Application Security Design Requirements

This course examines how to apply the application security maturity model to the development process.

E-Learning English
ENG 311

Attack Surface Analysis and Reduction

Learn about attack surface analysis and reduction as an exercise in risk reduction.

E-Learning English Multi-Language
ENG 312

How to Perform a Security Code Review

Application developers may use a variety of tools to identify flaws in their software. Many of these tools, however, cannot be deployed until late in the development lifecycle; dynamic analysis tools require a staging site and sample data, and some static analysis tools require a compiled build. Manual code reviews, in contrast, can begin at any time and require no specialized tools - only secure coding knowledge. Manual code reviews can also be laborious if every line of source code is reviewed. This course provides students with guidance on how to best organize code reviews, prioritize those code segments that will be reviewed, best practices for reviewing source code and maximize security resources.

E-Learning English Multi-Language
UPDATED
ENG 392

Attack Surface Analysis and Reduction for IoT Embedded Systems

Learn about attack surface analysis and reduction for IoT embedded systems.

E-Learning English
ENG 801

Effective Threat Modeling

This Instructor-Led course introduces the technique of threat modeling, its primary goals, and its role within software development.

Live Training English
Sorry, there are no courses that meet these specifications.