Software Acceptance, Deployment, Operations, & Maintenance
Expert
- 17 videos | 1h 11m 21s
- Includes Assessment
- Earns a Badge
Regardless of the design, vulnerabilities in software are to be expected. Explore pre- and post-release activities, installation and deployment controls, and operations and maintenance best practices for managing vulnerabilities.
WHAT YOU WILL LEARN
-
Identify the characteristics of the pre-release testing processList the six generic criteria for judging the suitability of a productIdentify the characteristics of risk acceptanceIdentify characteristics of a post-release planRecognize characteristics of validation and verificationRecognize characteristics of independent testingIdentify the role of bootstrapping in deployment activitiesRecognize characteristics of configuration management roles and planDistinguish between the six configuration management process activities
-
Recognize characteristics of release management activitiesRecognize characteristics of monitoring during operations and maintenanceDistinguish between the different activities of incident managementRecognize characteristics of problem managementRecognize characteristics of change managementRecognize characteristics of backup, recovery, and archivingIdentify the components of an effective software disposal planIdentify key activities during software disposal execution
IN THIS COURSE
-
4m 58sFind out how to identify the characteristics of the pre-release testing process. FREE ACCESS
-
5m 32sUpon completion of this video, you will be able to list six generic criteria for judging the suitability of a product. FREE ACCESS
-
6m 49sDuring this video, you will learn how to identify the characteristics of risk acceptance. FREE ACCESS
-
4m 16sLearn how to identify characteristics of a post-release plan. FREE ACCESS
-
5m 15sUpon completion of this video, you will be able to recognize characteristics of validation and verification. FREE ACCESS
-
4m 5sUpon completion of this video, you will be able to recognize characteristics of independent testing. FREE ACCESS
-
1m 54sDuring this video, you will learn how to identify the role of bootstrapping in deployment activities. FREE ACCESS
-
3m 32sAfter completing this video, you will be able to recognize characteristics of configuration management roles and plan accordingly. FREE ACCESS
-
4m 14sIn this video, find out how to distinguish between the six configuration management process activities. FREE ACCESS
-
2m 17sUpon completion of this video, you will be able to recognize characteristics of release management activities. FREE ACCESS
-
3m 33sAfter completing this video, you will be able to recognize characteristics of monitoring during operations and maintenance. FREE ACCESS
-
6m 6sIn this video, you will learn how to distinguish between the different activities of incident management. FREE ACCESS
-
3m 15sUpon completion of this video, you will be able to recognize characteristics of problem management. FREE ACCESS
-
3m 28sUpon completion of this video, you will be able to recognize characteristics of change management. FREE ACCESS
-
3m 36sAfter completing this video, you will be able to recognize characteristics of backup, recovery, and archiving. FREE ACCESS
-
4m 3sLearn how to identify the components of an effective software disposal plan. FREE ACCESS
-
4m 29sLearn how to identify key activities during software disposal. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.