(Coming Soon) Implementing the MS SDL Process Into your SDLC
This series introduces the fundamentals of the Microsoft Security Development Lifecycle (SDL) process and covers the security requirements for each phase your SDLC. Agile SDL variation, the Security Development Lifecycle for Line-of-Business Applications (SDL-LOB), and the Microsoft SDL Threat Modeling tool.
(Coming Soon) Introduction to the Microsoft SDL
This course describes the main phases of the Microsoft Security Development Lifecycle (SDL) process, namely Requirements, Design, Implementation, Verification, and Release, with a focus on security throughout. After completing this course, you will be able to list the phases of the Microsoft SDL process, and describe the required and recommended tasks for each phase of the process
(Coming Soon) Implementing the Agile MS SDL
This course describes the Agile variation of the Microsoft Security Development Lifecycle (SDL) process. The standard MS SDL process follows the traditional incremental waterfall model, while Agile methodologies are more iterative. SDL-Agile maps critical security practices into every-sprint requirements, bucket or periodic requirements, and one-time requirements.
(Coming Soon) Implementing the MS SDL Optimization Model
This course introduces the Microsoft Security Development Lifecycle (SDL) Optimization Model and how to use it.
(Coming Soon) Implementing MS SDL Line of Business
This course describes the Microsoft Security Development Lifecycle for Line of Business (SDL-LOB), aimed at development of internal or business-facing applications. Important activities include security training, risk assessment, and the typical software lifecycle phases: Requirements, Design, Implementation, Verification, and Release.
(Coming Soon) Implementing the MS SDL Threat Modeling Tool
This course describes the features of the Microsoft SDL Threat Modeling tool, which complements the Microsoft SDL Threat Modeling process. While not required to perform threat modeling, use of the tool aids teams with the creation of threat models and helps enumerate threats using STRIDE.
How to Create Application Security Design Requirements
This course examines how to apply the application security maturity model to the development process.
Attack Surface Analysis and Reduction
Learn about attack surface analysis and reduction as an exercise in risk reduction.
How to Perform a Security Code Review
Application developers may use a variety of tools to identify flaws in their software. Many of these tools, however, cannot be deployed until late in the development lifecycle; dynamic analysis tools require a staging site and sample data, and some static analysis tools require a compiled build. Manual code reviews, in contrast, can begin at any time and require no specialized tools - only secure coding knowledge. Manual code reviews can also be laborious if every line of source code is reviewed. This course provides students with guidance on how to best organize code reviews, prioritize those code segments that will be reviewed, best practices for reviewing source code and maximize security resources.
Attack Surface Analysis and Reduction for IoT Embedded Systems
Learn about attack surface analysis and reduction for IoT embedded systems.
Effective Threat Modeling
This Instructor-Led course introduces the technique of threat modeling, its primary goals, and its role within software development.