Supply Chain & Software Acquisition
Expert
- 14 videos | 1h 4m 24s
- Includes Assessment
- Earns a Badge
Software life cycle activities regularly extend beyond the internal environment. Explore supplier risk assessment considerations, including intellectual property, code reuse, and legal compliance complexities.
WHAT YOU WILL LEARN
-
Recognize characteristics of risk assessment for code reuseIdentify best practices for creating a practical reuse planIdentify best practices for preventing intellectual property theftRecognize characteristics of legal complianceIdentify best practices for supplier prequalification activitiesDistinguish between different security trade-offs in supplier sourcingIdentify best practices for contractual integrity controls
-
Identify best practices for vendor technical integrity controlsIdentify best secure control practices for managed services from a supplierDistinguish between the two rules slas should provideIdentify technical controls for software development and testingIdentify code testing and verification options for software development and testingList the eight steps to create a formal set of security testing controlsIdentify software requirements verification and validation
IN THIS COURSE
-
4m 49sUpon completion of this video, you will be able to recognize characteristics of risk assessment for code reuse. FREE ACCESS
-
7m 23sIn this video, find out how to identify best practices for creating a practical recycling plan. FREE ACCESS
-
4m 28sDuring this video, you will learn how to identify best practices for preventing theft of intellectual property. FREE ACCESS
-
4m 54sAfter completing this video, you will be able to recognize characteristics of legal compliance. FREE ACCESS
-
4m 57sLearn how to identify best practices for supplier prequalification activities. FREE ACCESS
-
5m 31sIn this video, learn how to distinguish between different security trade-offs when sourcing suppliers. FREE ACCESS
-
3m 17sIn this video, you will identify best practices for maintaining the integrity of contracts. FREE ACCESS
-
6m 10sDuring this video, you will learn how to identify best practices for vendor technical integrity controls. FREE ACCESS
-
2m 58sLearn how to identify the best secure control practices for managed services from a supplier. FREE ACCESS
-
4m 36sLearn how to distinguish between the two rules that SLAs should provide. FREE ACCESS
-
3m 21sIn this video, you will identify technical controls for software development and testing. FREE ACCESS
-
3m 19sIn this video, learn how to identify code testing and verification options for software development and testing. FREE ACCESS
-
5m 11sAfter completing this video, you will be able to list the eight steps to create a formal set of security testing controls. FREE ACCESS
-
3m 31sLearn how to identify software requirements, verification, and validation. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Channel
Interskill PL/1 Programming