Implementing Security Activities across the Technology Life Cycle

Expert
  • 12 videos | 35m 56s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 11 users Rating 4.4 of 11 users (11)
Discover how to implement security activities across technology and software development life cycles. In this course, you will explore system DLC requirements, acquisition, testing, and evaluation. Review system DLC operations, monitoring, and maintenance. Study system DLC configuration and change management, asset management, and inventory control. Examine software DLC applications and software assurance, software DLC NX/XN bit, ASLR, and code quality. Consider software DLC testing and DevOps. Review agile, waterfall, and spiral software development. Identify security requirements for a traceability matrix and establish adequate solutions adaptation. Finally, you will complete an exercise to describe life cycle activities.

WHAT YOU WILL LEARN

  • Describe the system dlc requirements, acquisition, testing, and evaluation
    Describe the system dlc operations, monitoring, and maintenance
    Describe the system dlc configuration and change management
    Define the software dlc applications and software assurance
    Define the software dlc nx/xn bit, aslr, and code quality
    Define the software dlc testing and devops
  • Define agile, waterfall, and spiral software development
    Define the security requirements traceability matrix
    Define testing and validation in the software dlc
    Adapt adequate solutions
    Describe asset management and inventory control
    Describe life cycle activities

IN THIS COURSE

  • 5m 34s
    Upon completion of this video, you will be able to describe the system's DLC requirements, acquisition, testing, and evaluation. FREE ACCESS
  • 2m 9s
    Upon completion of this video, you will be able to describe the system DLC operations, monitoring, and maintenance. FREE ACCESS
  • Locked
    3.  Systems DLC Configuration and Change Management
    2m 30s
    Upon completion of this video, you will be able to describe the system DLC configuration and change management. FREE ACCESS
  • Locked
    4.  Software DLC Applications and Software Assurance
    3m 20s
    In this video, you will learn how to define the software DLC applications and software assurance. FREE ACCESS
  • Locked
    5.  Software DLC NX/XN Bit, ASLR, and Code Quality
    1m 58s
    During this video, you will learn how to define the software NX/XN bit, ASLR, and code quality. FREE ACCESS
  • Locked
    6.  Software DLC Testing and DevOps
    4m 19s
    Learn how to define the software DLC testing and DevOps. FREE ACCESS
  • Locked
    7.  Agile, Waterfall, and Spiral Software Development
    6m 26s
    In this video, you will learn how to define agile, waterfall, and spiral software development. FREE ACCESS
  • Locked
    8.  Security Requirements Traceability Matrix (SRTM)
    2m 2s
    In this video, you will learn how to define the security requirements traceability matrix. FREE ACCESS
  • Locked
    9.  Testing and Validation in the Software DLC
    3m 8s
    In this video, you will learn how to define testing and validation in the software development life cycle. FREE ACCESS
  • Locked
    10.  Adapting Adequate Solutions
    1m 4s
    In this video, you will learn how to find appropriate solutions. FREE ACCESS
  • Locked
    11.  Asset Management and Inventory Control
    1m 32s
    Upon completion of this video, you will be able to describe asset management and inventory control. FREE ACCESS
  • Locked
    12.  Exercise: Describe Life Cycle Activities
    1m 54s
    Upon completion of this video, you will be able to describe the life cycle. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.7 of 266 users Rating 4.7 of 266 users (266)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 13 users Rating 4.6 of 13 users (13)
Rating 4.2 of 25 users Rating 4.2 of 25 users (25)
Rating 4.5 of 110 users Rating 4.5 of 110 users (110)