Secure Requirements

  • 15 Videos | 1h 11m 56s
  • Includes Assessment
  • Earns a Badge
Likes 27 Likes 27
Integrating security into the software development process is paramount to secure software development. Explore internal and external security requirements, the role of deployment, sequencing and timing, and operational requirements.

WHAT YOU WILL LEARN

  • identify typical internal security requirements
    identify typical external security requirements
    identify data state categories
    identify data usage categories
    distinguish between the data owner and data custodian roles
    distinguish between the different impact level definitions
    distinguish between structured and unstructured data
    distinguish between generation, retention, and disposal
  • identify characteristics of role and user definitions
    identify the role of the deployment environment within functional requirements
    distinguish between objects, activities and actions
    identify best practices for sequencing and timing
    identify characteristics of software deployment requirements
    identify characteristics of operations requirements
    identify characteristics of management requirements

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 8 Likes 8  
CHANNEL Cybersecurity
Likes 338 Likes 338  
Likes 5 Likes 5  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 132 Likes 132