Software Acceptance, Deployment, Operations, & Maintenance

Expert
  • 17 videos | 1h 11m 21s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 90 users Rating 4.4 of 90 users (90)
Regardless of the design, vulnerabilities in software are to be expected. Explore pre- and post-release activities, installation and deployment controls, and operations and maintenance best practices for managing vulnerabilities.

WHAT YOU WILL LEARN

  • Identify the characteristics of the pre-release testing process
    List the six generic criteria for judging the suitability of a product
    Identify the characteristics of risk acceptance
    Identify characteristics of a post-release plan
    Recognize characteristics of validation and verification
    Recognize characteristics of independent testing
    Identify the role of bootstrapping in deployment activities
    Recognize characteristics of configuration management roles and plan
    Distinguish between the six configuration management process activities
  • Recognize characteristics of release management activities
    Recognize characteristics of monitoring during operations and maintenance
    Distinguish between the different activities of incident management
    Recognize characteristics of problem management
    Recognize characteristics of change management
    Recognize characteristics of backup, recovery, and archiving
    Identify the components of an effective software disposal plan
    Identify key activities during software disposal execution

IN THIS COURSE

  • 4m 58s
    Find out how to identify the characteristics of the pre-release testing process. FREE ACCESS
  • 5m 32s
    Upon completion of this video, you will be able to list six generic criteria for judging the suitability of a product. FREE ACCESS
  • Locked
    3.  Risk Acceptance
    6m 49s
    During this video, you will learn how to identify the characteristics of risk acceptance. FREE ACCESS
  • Locked
    4.  Post-release Plan
    4m 16s
    Learn how to identify characteristics of a post-release plan. FREE ACCESS
  • Locked
    5.  Validation and Verification
    5m 15s
    Upon completion of this video, you will be able to recognize characteristics of validation and verification. FREE ACCESS
  • Locked
    6.  Independent Testing
    4m 5s
    Upon completion of this video, you will be able to recognize characteristics of independent testing. FREE ACCESS
  • Locked
    7.  Bootstrapping
    1m 54s
    During this video, you will learn how to identify the role of bootstrapping in deployment activities. FREE ACCESS
  • Locked
    8.  Configuration Management Roles and Plan
    3m 32s
    After completing this video, you will be able to recognize characteristics of configuration management roles and plan accordingly. FREE ACCESS
  • Locked
    9.  Configuration Management Process
    4m 14s
    In this video, find out how to distinguish between the six configuration management process activities. FREE ACCESS
  • Locked
    10.  Release Management
    2m 17s
    Upon completion of this video, you will be able to recognize characteristics of release management activities. FREE ACCESS
  • Locked
    11.  Monitoring
    3m 33s
    After completing this video, you will be able to recognize characteristics of monitoring during operations and maintenance. FREE ACCESS
  • Locked
    12.  Incident Management
    6m 6s
    In this video, you will learn how to distinguish between the different activities of incident management. FREE ACCESS
  • Locked
    13.  Problem Management
    3m 15s
    Upon completion of this video, you will be able to recognize characteristics of problem management. FREE ACCESS
  • Locked
    14.  Change Management
    3m 28s
    Upon completion of this video, you will be able to recognize characteristics of change management. FREE ACCESS
  • Locked
    15.  Backup, Recovery, and Archiving
    3m 36s
    After completing this video, you will be able to recognize characteristics of backup, recovery, and archiving. FREE ACCESS
  • Locked
    16.  Software Disposal Planning
    4m 3s
    Learn how to identify the components of an effective software disposal plan. FREE ACCESS
  • Locked
    17.  Software Disposal Execution
    4m 29s
    Learn how to identify key activities during software disposal. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 7 users Rating 4.6 of 7 users (7)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.3 of 86 users Rating 4.3 of 86 users (86)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 202 users Rating 4.5 of 202 users (202)
Rating 4.4 of 134 users Rating 4.4 of 134 users (134)
Rating 4.7 of 53 users Rating 4.7 of 53 users (53)