💻 Software Development Security

Domain 8 — Choose a game to play

← Back to Domains
🎯

Dev Security Matcher

Match SQL injection, buffer overflow, XSS, DevSecOps, OWASP Top 10, Secure SDLC, and API gateways.

Drag & Match
🔄

SDLC Model Sorter

Sort 35 characteristics into the right SDLC model: Agile, Scrum, Waterfall, Spiral, V-Model, Iterative, and RAD.

Categorize
📋

SDLC Phase Ordering

Drag all 7 ISC2 CBK phases into the correct order, master V&V vs Accreditation, and tackle a 10-question CISSP drill.

Drag & Drop
⚖️

V&V vs Cert vs Accreditation

Sort 12 real-world scenarios into Verification, Validation, Certification, or Accreditation/ATO. 3 lives, instant feedback, touch support.

Drag & Drop
📊

CMMI Maturity Levels Matcher

Match CMMI levels 1–5 to their definitions. Repeatable = memory (not docs). Defined = documented, standardized. A classic exam trap.

Drag & Match
🎯

Threat Modeling Quiz

What's in scope? What's out? ISC2 vs ISACA perspectives. Threat modeling is NOT bug fixing. 5 scenario-based CISSP questions.

MCQ Quiz