Secure Requirements
Expert
- 15 Videos | 1h 4m 26s
- Includes Assessment
- Earns a Badge
Integrating security into the software development process is paramount to secure software development. Explore internal and external security requirements, the role of deployment, sequencing and timing, and operational requirements.
WHAT YOU WILL LEARN
-
identify typical internal security requirementsidentify typical external security requirementsidentify data state categoriesidentify data usage categoriesdistinguish between the data owner and data custodian rolesdistinguish between the different impact level definitionsdistinguish between structured and unstructured datadistinguish between generation, retention, and disposal
-
identify characteristics of role and user definitionsidentify the role of the deployment environment within functional requirementsdistinguish between objects, activities and actionsidentify best practices for sequencing and timingidentify characteristics of software deployment requirementsidentify characteristics of operations requirementsidentify characteristics of management requirements
IN THIS COURSE
-
1.Internal Requirements5m 24sUP NEXT
-
2.External Requirements3m 15s
-
3.Data Classification (Part 1)6m 24s
-
4.Data Classification (Part 2)4m 23s
-
5.Data Ownership2m 59s
-
6.Labeling4m 27s
-
7.Data Types5m 26s
-
8.Data Lifecycle4m 59s
-
9.Role and User Definitions3m 45s
-
10.Deployment Environment3m 29s
-
11.Objects, Activities, and Actions3m 31s
-
12.Sequencing and Timing Requirements5m 31s
-
13.Deployment Requirements3m 35s
-
14.Operations Requirements3m 44s
-
15.Management Requirements3m 34s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.