Secure Requirements

Expert
  • 15 Videos | 1h 4m 26s
  • Includes Assessment
  • Earns a Badge
Likes 36 Likes 36
Integrating security into the software development process is paramount to secure software development. Explore internal and external security requirements, the role of deployment, sequencing and timing, and operational requirements.

WHAT YOU WILL LEARN

  • identify typical internal security requirements
    identify typical external security requirements
    identify data state categories
    identify data usage categories
    distinguish between the data owner and data custodian roles
    distinguish between the different impact level definitions
    distinguish between structured and unstructured data
    distinguish between generation, retention, and disposal
  • identify characteristics of role and user definitions
    identify the role of the deployment environment within functional requirements
    distinguish between objects, activities and actions
    identify best practices for sequencing and timing
    identify characteristics of software deployment requirements
    identify characteristics of operations requirements
    identify characteristics of management requirements

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

CHANNEL Scrum
Likes 285 Likes 285  
Likes 235 Likes 235  
CHANNEL Cybersecurity
Likes 569 Likes 569  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 143 Likes 143  
Likes 2025 Likes 2025