Boot Camp

(ISC)² CSSLP® Training Boot Camp

Become a Certified Secure Software Lifecycle Professional (CSSLP). You’ll leave this boot camp with the knowledge and domain expertise needed to pass the CSSLP exam the first time you take it.

4.31 (598 ratings)

Get certified, guaranteed

Everything you need to earn your CSSLP

  • 90-day extended access to Boot Camp components, including class recordings
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee
  • Exam voucher
  • Free 90-day Infosec Skills subscription (access to 1,400+ additional courses and labs)
  • Knowledge Transfer Guarantee
  • Pre-study learning path
  • Unlimited practice exam attempts

Award-winning training you can trust

Wistia video thumbnail

What you'll learn

Training overview

Infosec’s CSSLP Boot camp teaches you how to incorporate security practices throughout the software development lifecycle. You’ll learn key policies, procedures and best practices related to secure software development and how to incorporate them into each phase of the development lifecycle.

You’ll leave fully prepared to earn your CSSLP certification and prove to employers that you have the knowledge and skills necessary to implement secure software development and help mitigate cyber threats.

Before your boot camp


In order to obtain the CSSLP certification, you must have:

  • At least four years of professional Software Development Lifecycle (SDLC) experience
  • A work history reflecting direct experience in at least one of the eight domains listed in the (ISC)² CSSLP Common Body of Knowledge (CBK)

However, you can become an Associate of (ISC)² by passing the exam without the required work experience.


Training schedule

  • Secure software concepts
      • Core concepts
      • Security design principles
  • Secure software requirements
      • Define software security requirements
      • Identify and analyze compliance requirements
      • Identify and analyze data classification requirements
      • Identify and analyze privacy requirements
      • Develop misuse and abuse cases
      • Develop security requirement traceability matrix (SRTM)
      • Ensure security requirements flow down to suppliers/providers
  • Secure software architecture and design
      • Perform threat modeling
      • Define the security architecture
      • Performing secure interface design
      • Performing architectural risk assessment
      • Modeling (non-functional) security properties and constraints
      • Model and classify data
      • Evaluate and select reusable secure design
      • Perform security architecture and design review
      • Define secure operational architecture (e.g., deployment topology, operational interfaces)
      • Use secure architecture and design principles, patterns and tools
  • Secure software implementation
      • Adhere to relevant secure coding practices (e.g., standards, guidelines and regulations)
      • Analyze code for security risks
      • Implement security controls (e.g., watchdogs, file integrity monitoring (FIM), anti-malware)
      • Address security risks (e.g. remediation, mitigation, transfer, accept)
      • Securely reuse third-party code or libraries (e.g., software composition analysis (SCA))
      • Securely integrate components
      • Apply security during the build process
  • Secure software testing
      • Develop security test cases
      • Develop security testing strategy and plan
      • Verify and validate documentation (e.g., installation and setup instructions, error messages, user guides, release notes)
      • Identify undocumented functionality
      • Analyze security implications of test results (e.g., impact on product management, prioritization, break build criteria)
      • Classify and track security errors
      • Secure test data
      • Perform verification and validation testing
  • Secure software lifecycle management
      • Secure configuration and version control (e.g., hardware, software, documentation, interfaces, patching)
      • Define strategy and roadmap
      • Manage security within a software development methodology
      • Identify security standards and frameworks
      • Define and develop security documentation
      • Develop security metrics (e.g., defects per line of code, criticality level, average remediation time, complexity)
      • Decommission software
      • Report security status (e.g., reports, dashboards, feedback loops)
      • Incorporate integrated risk management (IRM)
      • Promote security culture in software development
      • Implement continuous improvement (e.g., retrospective, lessons learned)
  • Secure software deployment, operations and maintenance
      • Perform operational risk analysis
      • Release software securely
      • Securely store and manage security data
      • Ensure secure installation
      • Perform post-deployment security testing
      • Obtain security approval to operate (e.g., risk acceptance, sign-off at appropriate level)
      • Perform information security continuous monitoring (ISCM)
      • Support incident response
      • Perform patch management (e.g. secure release, testing)
      • Perform vulnerability management (e.g., scanning, tracking, triaging)
      • Runtime protection (e.g., runtime application self-protection (RASP), web application firewall (WAF), address space layout randomization (ASLR))
      • Support continuity of operations
      • Integrate service level objectives (SLO) and service level agreements (SLA) (e.g., maintenance, performance, availability, qualified personnel)
  • Secure software supply chain
      • Implement software supply chain risk management
      • Analyze security of third-party software
      • Verify pedigree and provenance
      • Ensure supplier security requirements in the acquisition process
      • Support contractual requirements (e.g., intellectual property (IP) ownership, code escrow, liability, warranty, end-user license agreement (EULA), service level agreements (SLA))

Meets 8570.1 requirements

Attention DoD Information Assurance workers! This boot camp helps meet U.S. Department of Defense Directive 8570.1 requirements for department employees or contractors engaged in work related to information security.

Guaranteed results

Our boot camp guarantees

Exam Pass Guarantee

If you don’t pass your exam on the first attempt, get a second attempt for free. Includes the ability to re-sit the course for free for up to one year (does not apply to CMMC-AB boot camps).

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee

If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.

Unlock team training discounts

If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.

Enroll in a boot camp

  • June 19, 2023 - June 23, 2023

    Online only

    Exam Pass Guarantee
  • August 28, 2023 - September 1, 2023

    Online only

    Exam Pass Guarantee
  • November 13, 2023 - November 17, 2023

    Online only

    Exam Pass Guarantee
  • February 5, 2024 - February 9, 2024

    Online only

    Exam Pass Guarantee
  • March 18, 2024 - March 22, 2024

    Online only

    Exam Pass Guarantee