Ensuring secure software development requires specific cybersecurity talent and leadership. Organizational needs drive the design and requirements for security in software, and development must consider both business and security goals from the beginning of the lifecycle.

Foundations of Software Lifecycle Development and Security

Foundations of Software Lifecycle Development and Security

Instructor: ISC2 Education & Training
Access provided by Interbank
Recommended experience
Skills you'll gain
Details to know

Add to your LinkedIn profile
9 assignments
February 2026
See how employees at top companies are mastering in-demand skills

There are 11 modules in this course
What's included
1 video
Core security objectives of confidentiality, integrity and availability (CIA), as well as privacy, drive the requirements for security in software. Secure design principles define practices that can guide decisions at the architecture level regardless of the platform and regardless of the programming language. These principles lay the foundation for building secure software.
What's included
3 videos1 assignment
Organizations follow different approaches to develop software, but security must be integrated throughout the process. This module explores compliance challenges, risk management, secure configuration, and best practices for protecting software across its entire life cycle.
What's included
5 videos1 assignment
Good software security begins with an organizational structure that defines and addresses requirements. Establishing these expectations upfront helps reduce the need for excessive production security safeguards later in the life cycle.
What's included
3 videos1 assignment
The design phase is where critical decisions shape both functionality and security. Strong architecture and thoughtful planning help reduce risks and create a solid foundation for secure software.
What's included
5 videos1 assignment
The implementation phase is one of the most important phases of the software development life cycle. Organizations that develop software should establish and enforce secure coding standards and ensure robust input validation, output encoding, authentication, session management, access control, and error management.
What's included
5 videos1 assignment
Testing ensures software works as intended and can withstand misuse or attacks. Security testing plays a critical role by identifying vulnerabilities early and reducing risk before release.
What's included
7 videos1 assignment
Deployment and integration are critical moments for security. Strong controls, secure configurations, and ongoing monitoring help protect systems and maintain operational integrity.
What's included
8 videos1 assignment
Outsourcing and third-party software can speed development but also increase exposure to vulnerabilities. Strong controls and careful oversight help safeguard the supply chain and critical assets.
What's included
5 videos1 assignment
ISC2 is the world’s leading member organization for cybersecurity professionals, driven by our vision of a safe and secure cyber world. Our certified members and associates are a force for good, safeguarding the way we live. Our certifications enable professionals to demonstrate their knowledge, skills and abilities at every stage of their careers. Becoming a certified secure software life cycle professional through the CSSLP shows employers and peers that you have the advanced technical skills and knowledge necessary to implement best practices, policies, and procedures throughout the SDLC.
What's included
1 video
What's included
1 reading1 assignment
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.






