Secure Requirements
Expert
- 15 videos | 1h 4m 26s
- Includes Assessment
- Earns a Badge
Integrating security into the software development process is paramount to secure software development. Explore internal and external security requirements, the role of deployment, sequencing and timing, and operational requirements.
WHAT YOU WILL LEARN
-
Identify typical internal security requirementsIdentify typical external security requirementsIdentify data state categoriesIdentify data usage categoriesDistinguish between the data owner and data custodian rolesDistinguish between the different impact level definitionsDistinguish between structured and unstructured dataDistinguish between generation, retention, and disposal
-
Identify characteristics of role and user definitionsIdentify the role of the deployment environment within functional requirementsDistinguish between objects, activities and actionsIdentify best practices for sequencing and timingIdentify characteristics of software deployment requirementsIdentify characteristics of operations requirementsIdentify characteristics of management requirements
IN THIS COURSE
-
5m 24s
-
3m 15s
-
6m 24s
-
4m 23s
-
2m 59s
-
4m 27s
-
5m 26s
-
4m 59s
-
3m 45s
-
3m 29s
-
3m 31s
-
5m 31s
-
3m 35s
-
3m 44s
-
3m 34s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.