Secure Requirements

Expert
  • 15 videos | 1h 4m 26s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 202 users Rating 4.5 of 202 users (202)
Integrating security into the software development process is paramount to secure software development. Explore internal and external security requirements, the role of deployment, sequencing and timing, and operational requirements.

WHAT YOU WILL LEARN

  • Identify typical internal security requirements
    Identify typical external security requirements
    Identify data state categories
    Identify data usage categories
    Distinguish between the data owner and data custodian roles
    Distinguish between the different impact level definitions
    Distinguish between structured and unstructured data
    Distinguish between generation, retention, and disposal
  • Identify characteristics of role and user definitions
    Identify the role of the deployment environment within functional requirements
    Distinguish between objects, activities and actions
    Identify best practices for sequencing and timing
    Identify characteristics of software deployment requirements
    Identify characteristics of operations requirements
    Identify characteristics of management requirements

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 64 users Rating 4.4 of 64 users (64)
Rating 4.7 of 29 users Rating 4.7 of 29 users (29)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 147 users Rating 4.6 of 147 users (147)
Rating 4.5 of 67 users Rating 4.5 of 67 users (67)
Rating 4.7 of 53 users Rating 4.7 of 53 users (53)