Supply Chain & Software Acquisition

Expert
  • 14 Videos | 1h 11m 24s
  • Includes Assessment
  • Earns a Badge
Likes 14 Likes 14
Software life cycle activities regularly extend beyond the internal environment. Explore supplier risk assessment considerations, including intellectual property, code reuse, and legal compliance complexities.

WHAT YOU WILL LEARN

  • recognize characteristics of risk assessment for code reuse
    identify best practices for creating a practical reuse plan
    identify best practices for preventing intellectual property theft
    recognize characteristics of legal compliance
    identify best practices for supplier prequalification activities
    distinguish between different security trade-offs in supplier sourcing
    identify best practices for contractual integrity controls
  • identify best practices for vendor technical integrity controls
    identify best secure control practices for managed services from a supplier
    distinguish between the two rules SLAs should provide
    identify technical controls for software development and testing
    identify code testing and verification options for software development and testing
    list the eight steps to create a formal set of security testing controls
    identify software requirements verification and validation

IN THIS COURSE

  • Playable
    1. 
    Risk Assessment for Code Reuse
    4m 49s
    UP NEXT
  • Playable
    2. 
    Code Reuse Plan Best Practices
    7m 23s
  • Locked
    3. 
    Intellectual Property
    4m 28s
  • Locked
    4. 
    Legal Compliance
    4m 54s
  • Locked
    5. 
    Supplier Prequalification
    4m 57s
  • Locked
    6. 
    Supplier Sourcing Challenges
    5m 31s
  • Locked
    7. 
    Contractual Integrity Controls
    3m 17s
  • Locked
    8. 
    Vendor Technical Integrity Controls
    6m 10s
  • Locked
    9. 
    Managed Services Controls
    2m 58s
  • Locked
    10. 
    Service-level Agreements
    4m 36s
  • Locked
    11. 
    Technical Controls
    3m 21s
  • Locked
    12. 
    Code Testing and Verification
    3m 19s
  • Locked
    13. 
    Security Testing Controls
    5m 11s
  • Locked
    14. 
    Software Requirements Verification and Validation
    3m 31s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 40 Likes 40  
Likes 65 Likes 65  
Likes 222 Likes 222