Secure Requirements

Expert
  • 15 Videos | 1h 11m 56s
  • Includes Assessment
  • Earns a Badge
Likes 36 Likes 36
Integrating security into the software development process is paramount to secure software development. Explore internal and external security requirements, the role of deployment, sequencing and timing, and operational requirements.

WHAT YOU WILL LEARN

  • identify typical internal security requirements
    identify typical external security requirements
    identify data state categories
    identify data usage categories
    distinguish between the data owner and data custodian roles
    distinguish between the different impact level definitions
    distinguish between structured and unstructured data
    distinguish between generation, retention, and disposal
  • identify characteristics of role and user definitions
    identify the role of the deployment environment within functional requirements
    distinguish between objects, activities and actions
    identify best practices for sequencing and timing
    identify characteristics of software deployment requirements
    identify characteristics of operations requirements
    identify characteristics of management requirements

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

CHANNEL Cybersecurity
Likes 370 Likes 370  
Likes 6 Likes 6  
Likes 44 Likes 44  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 244 Likes 244