Secure Design
Expert
- 16 videos | 1h 19m 49s
- Includes Assessment
Security practices must be integrated in every aspect of software design. Explore secure software design processes, such as attack surface evaluation, control identification and prioritization, and threat modeling.
WHAT YOU WILL LEARN
-
Measure and minimize attack surfaceRecognize threat modeling techniques and purpose of documentationIdentify characteristics of control identification and prioritizationIdentify characteristics of design and architecture technical reviewIdentify characteristics of risk assessment for code reuseDistinguish between applicable methods to address core security conceptsRecognize security design principle best practicesDistinguish between interconnectivity activities best practices
-
Identify interfaces best practicesDistinguish between the different architectural forms and supporting elements of secured distributed computingRecognize best practices for securing service-oriented architectureRecognize best practices for securing rich internet applicationsRecognize best practices for securing pervasive and ubiquitous computingRecognize best security practices when integrating with existing architecturesRecognize best practices for securing cloud architecturesRecognize best practices for securing mobile applications
IN THIS COURSE
-
6m 18s
-
4m 51s
-
4m 48s
-
3m 27s
-
3m 27s
-
6m 7s
-
4m 42s
-
4m 38s
-
4m 11s
-
4m 59s
-
5m 15s
-
6m 6s
-
6m 50s
-
4m 17s
-
6m 36s
-
3m 18s