Supply Chain & Software Acquisition

Expert
  • 14 videos | 1h 4m 24s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 99 users Rating 4.5 of 99 users (99)
Software life cycle activities regularly extend beyond the internal environment. Explore supplier risk assessment considerations, including intellectual property, code reuse, and legal compliance complexities.

WHAT YOU WILL LEARN

  • Recognize characteristics of risk assessment for code reuse
    Identify best practices for creating a practical reuse plan
    Identify best practices for preventing intellectual property theft
    Recognize characteristics of legal compliance
    Identify best practices for supplier prequalification activities
    Distinguish between different security trade-offs in supplier sourcing
    Identify best practices for contractual integrity controls
  • Identify best practices for vendor technical integrity controls
    Identify best secure control practices for managed services from a supplier
    Distinguish between the two rules slas should provide
    Identify technical controls for software development and testing
    Identify code testing and verification options for software development and testing
    List the eight steps to create a formal set of security testing controls
    Identify software requirements verification and validation

IN THIS COURSE

  • 4m 49s
    Upon completion of this video, you will be able to recognize characteristics of risk assessment for code reuse. FREE ACCESS
  • 7m 23s
    In this video, find out how to identify best practices for creating a practical recycling plan. FREE ACCESS
  • Locked
    3.  Intellectual Property
    4m 28s
    During this video, you will learn how to identify best practices for preventing theft of intellectual property. FREE ACCESS
  • Locked
    4.  Legal Compliance
    4m 54s
    After completing this video, you will be able to recognize characteristics of legal compliance. FREE ACCESS
  • Locked
    5.  Supplier Prequalification
    4m 57s
    Learn how to identify best practices for supplier prequalification activities. FREE ACCESS
  • Locked
    6.  Supplier Sourcing Challenges
    5m 31s
    In this video, learn how to distinguish between different security trade-offs when sourcing suppliers. FREE ACCESS
  • Locked
    7.  Contractual Integrity Controls
    3m 17s
    In this video, you will identify best practices for maintaining the integrity of contracts. FREE ACCESS
  • Locked
    8.  Vendor Technical Integrity Controls
    6m 10s
    During this video, you will learn how to identify best practices for vendor technical integrity controls. FREE ACCESS
  • Locked
    9.  Managed Services Controls
    2m 58s
    Learn how to identify the best secure control practices for managed services from a supplier. FREE ACCESS
  • Locked
    10.  Service-level Agreements
    4m 36s
    Learn how to distinguish between the two rules that SLAs should provide. FREE ACCESS
  • Locked
    11.  Technical Controls
    3m 21s
    In this video, you will identify technical controls for software development and testing. FREE ACCESS
  • Locked
    12.  Code Testing and Verification
    3m 19s
    In this video, learn how to identify code testing and verification options for software development and testing. FREE ACCESS
  • Locked
    13.  Security Testing Controls
    5m 11s
    After completing this video, you will be able to list the eight steps to create a formal set of security testing controls. FREE ACCESS
  • Locked
    14.  Software Requirements Verification and Validation
    3m 31s
    Learn how to identify software requirements, verification, and validation. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
Rating 4.3 of 25 users Rating 4.3 of 25 users (25)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 34 users Rating 4.4 of 34 users (34)
Rating 4.4 of 134 users Rating 4.4 of 134 users (134)
Rating 4.7 of 53 users Rating 4.7 of 53 users (53)