Supply Chain & Software Acquisition
Expert
- 14 videos | 1h 4m 24s
- Includes Assessment
- Earns a Badge
Software life cycle activities regularly extend beyond the internal environment. Explore supplier risk assessment considerations, including intellectual property, code reuse, and legal compliance complexities.
WHAT YOU WILL LEARN
-
Recognize characteristics of risk assessment for code reuseIdentify best practices for creating a practical reuse planIdentify best practices for preventing intellectual property theftRecognize characteristics of legal complianceIdentify best practices for supplier prequalification activitiesDistinguish between different security trade-offs in supplier sourcingIdentify best practices for contractual integrity controls
-
Identify best practices for vendor technical integrity controlsIdentify best secure control practices for managed services from a supplierDistinguish between the two rules slas should provideIdentify technical controls for software development and testingIdentify code testing and verification options for software development and testingList the eight steps to create a formal set of security testing controlsIdentify software requirements verification and validation
IN THIS COURSE
-
4m 49sUpon completion of this video, you will be able to recognize characteristics of risk assessment for code reuse. FREE ACCESS
-
7m 23sIn this video, find out how to identify best practices for creating a practical recycling plan. FREE ACCESS
-
4m 28sDuring this video, you will learn how to identify best practices for preventing theft of intellectual property. FREE ACCESS
-
4m 54sAfter completing this video, you will be able to recognize characteristics of legal compliance. FREE ACCESS
-
4m 57sLearn how to identify best practices for supplier prequalification activities. FREE ACCESS
-
5m 31sIn this video, learn how to distinguish between different security trade-offs when sourcing suppliers. FREE ACCESS
-
3m 17sIn this video, you will identify best practices for maintaining the integrity of contracts. FREE ACCESS
-
6m 10sDuring this video, you will learn how to identify best practices for vendor technical integrity controls. FREE ACCESS
-
2m 58sLearn how to identify the best secure control practices for managed services from a supplier. FREE ACCESS
-
4m 36sLearn how to distinguish between the two rules that SLAs should provide. FREE ACCESS
-
3m 21sIn this video, you will identify technical controls for software development and testing. FREE ACCESS
-
3m 19sIn this video, learn how to identify code testing and verification options for software development and testing. FREE ACCESS
-
5m 11sAfter completing this video, you will be able to list the eight steps to create a formal set of security testing controls. FREE ACCESS
-
3m 31sLearn how to identify software requirements, verification, and validation. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.