Secure Requirements

Expert
  • 15 videos | 1h 4m 26s
  • Includes Assessment
  • Earns a Badge
Likes 36 Likes 36
Integrating security into the software development process is paramount to secure software development. Explore internal and external security requirements, the role of deployment, sequencing and timing, and operational requirements.

WHAT YOU WILL LEARN

  • identify typical internal security requirements
    identify typical external security requirements
    identify data state categories
    identify data usage categories
    distinguish between the data owner and data custodian roles
    distinguish between the different impact level definitions
    distinguish between structured and unstructured data
    distinguish between generation, retention, and disposal
  • identify characteristics of role and user definitions
    identify the role of the deployment environment within functional requirements
    distinguish between objects, activities and actions
    identify best practices for sequencing and timing
    identify characteristics of software deployment requirements
    identify characteristics of operations requirements
    identify characteristics of management requirements

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Channel Scrum
Likes 309 Likes 309  
Channel Cybersecurity
Likes 695 Likes 695  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 244 Likes 244  
Likes 98 Likes 98