Course essentials
Boot camp at a glance
-
Method
Online, in-person, team onsite
-
Duration
6 days
-
Experience
3-5 years
-
Meets 8570.1
DoD Information Assurance requirements
What you'll learn
Training overview

Infosec’s CSSLP Boot camp teaches you how to incorporate security practices throughout the software development lifecycle. You’ll learn key policies, procedures and best practices related to secure software development and how to incorporate them into each phase of the development lifecycle.
You’ll leave fully prepared to earn your CSSLP certification and prove to employers that you have the knowledge and skills necessary to implement secure software development and help mitigate cyber threats.
Award-winning training you can trust
What's included
Everything you need to know

- 90-day extended access to Boot Camp components, including class recordings
- 100% Satisfaction Guarantee
- Exam Pass Guarantee
- Exam voucher
- Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
- Knowledge Transfer Guarantee
- Pre-study learning path
- Unlimited practice exam attempts
Before your boot camp
Prerequisites
In order to obtain the CSSLP certification, you must have:
- At least four years of professional Software Development Lifecycle (SDLC) experience
- A work history reflecting direct experience in at least one of the eight domains listed in the (ISC)² CSSLP Common Body of Knowledge (CBK)
However, you can become an Associate of (ISC)² by passing the exam without the required work experience.
Syllabus
Training schedule
Preparation (before the boot camp starts)
CSSLP prep course
Day 1
Secure software concepts
- Core concepts
- Security design principles
Secure software requirements
- Define software security requirements
- Identify and analyze compliance requirements
- Identify and analyze data classification requirements
- Identify and analyze privacy requirements
- Develop misuse and abuse cases
- Develop security requirement traceability matrix (SRTM)
- Ensure security requirements flow down to suppliers/providers
Optional group & individual study
Schedule may vary from class to class
Day 2
Secure software architecture and design
- Perform threat modeling
- Define the security architecture
- Performing secure interface design
- Performing architectural risk assessment
- Modeling (non-functional) security properties and constraints
- Model and classify data
- Evaluate and select reusable secure design
- Perform security architecture and design review
- Define secure operational architecture (e.g., deployment topology, operational interfaces)
- Use secure architecture and design principles, patterns and tools
Secure software architecture and design continued
Optional group & individual study
Schedule may vary from class to class
Day 3
Secure software implementation
- Adhere to relevant secure coding practices (e.g., standards, guidelines and regulations)
- Analyze code for security risks
- Implement security controls (e.g., watchdogs, file integrity monitoring (FIM), anti-malware)
- Address security risks (e.g. remediation, mitigation, transfer, accept)
- Securely reuse third-party code or libraries (e.g., software composition analysis (SCA))
- Securely integrate components
- Apply security during the build process
Secure software implementation continued
Optional group & individual study
Schedule may vary from class to class
Day 4
Secure software testing
- Develop security test cases
- Develop security testing strategy and plan
- Verify and validate documentation (e.g., installation and setup instructions, error messages, user guides, release notes)
- Identify undocumented functionality
- Analyze security implications of test results (e.g., impact on product management, prioritization, break build criteria)
- Classify and track security errors
- Secure test data
- Perform verification and validation testing
Secure software lifecycle management
- Secure configuration and version control (e.g., hardware, software, documentation, interfaces, patching)
- Define strategy and roadmap
- Manage security within a software development methodology
- Identify security standards and frameworks
- Define and develop security documentation
- Develop security metrics (e.g., defects per line of code, criticality level, average remediation time, complexity)
- Decommission software
- Report security status (e.g., reports, dashboards, feedback loops)
- Incorporate integrated risk management (IRM)
- Promote security culture in software development
- Implement continuous improvement (e.g., retrospective, lessons learned)
Optional group & individual study
Schedule may vary from class to class
Day 5
Secure software deployment, operations and maintenance
- Perform operational risk analysis
- Release software securely
- Securely store and manage security data
- Ensure secure installation
- Perform post-deployment security testing
- Obtain security approval to operate (e.g., risk acceptance, sign-off at appropriate level)
- Perform information security continuous monitoring (ISCM)
- Support incident response
- Perform patch management (e.g. secure release, testing)
- Perform vulnerability management (e.g., scanning, tracking, triaging)
- Runtime protection (e.g., runtime application self-protection (RASP), web application firewall (WAF), address space layout randomization (ASLR))
- Support continuity of operations
- Integrate service level objectives (SLO) and service level agreements (SLA) (e.g., maintenance, performance, availability, qualified personnel)
Secure software supply chain
- Implement software supply chain risk management
- Analyze security of third-party software
- Verify pedigree and provenance
- Ensure supplier security requirements in the acquisition process
- Support contractual requirements (e.g., intellectual property (IP) ownership, code escrow, liability, warranty, end-user license agreement (EULA), service level agreements (SLA))
Optional group & individual study
Schedule may vary from class to class
Day 6
Take the CSSLP exam
Schedule may vary from class to class
Guaranteed results
Our boot camp guarantees

Exam Pass Guarantee
If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).

100% Satisfaction Guarantee
If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee
If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.
Unlock team training discounts
If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

Meets 8570.1 requirements
Attention DoD Information Assurance workers! This boot camp helps meet U.S. Department of Defense Directive 8570.1 requirements for department employees or contractors engaged in work related to information security.
You're in good company
The instructor was able to take material that prior to the class had made no sense, and explained it in real world scenarios that were able to be understood.
Erik Heiss, United States Air Force
I really appreciate that our instructor was extremely knowledgeable and was able to provide the information in a way that it could be understood. He also provided valuable test-taking strategies that I know not only helped me with this exam, but will help in all exams I take in the future.
Michelle Jemmott, Pentagon
The course was extremely helpful and provided exactly what we needed to know in order to successfully navigate the exam. Without this I am not confident I would have passed.
Robert Caldwell, Salient Federal Solutions
Enroll in a boot camp
Explore our top boot camps
More learning opportunities
-
Most popularBoot camp
CompTIA Security+ Training Boot Camp
Infosec’s CompTIA Security+ Boot Camp teaches you information security theory and reinforces that theory with hands-on exercises to help you learn by doing. You’ll learn how to configure and operate many different technical security controls — and leave prepared to pass your Security+ exam.
Learn More
-
#1 FOR BEGINNERSBoot camp
Cisco CCNA Associate & CyberOps Associate Training Boot Camp with Dual Certification
Infosec’s authorized CCNA Dual Certification Boot Camp helps you build your knowledge of networking and provides hands-on experience installing, configuring and operating network devices — all while preparing you to earn two Cisco certifications.
Learn More
-
Most requestedBoot camp
(ISC)² CISSP® Certification Training and Boot Camp
Take your career to the next level by earning one of the most in-demand cybersecurity certifications. Infosec’s CISSP training provides a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional.
Learn More