Price:
$4,095.00
Days:
1
Virtual
– • Discuss the core concepts of software security and the foundational principles that drive the construction of resilient software.
– • Discuss the security design principles as essential elements for building secure software.
– • Discuss software security standards and frameworks, roadmaps and strategies, and risk management.
– • Explain security in software development methodologies, security metrics, and security culture in software development.
– • Identify and analyze software requirements pertaining to data privacy, security, and compliance with laws and regulations.
– • Describe requirement specification and traceability, misuse and abuse cases, and flow down of security requirements to suppliers.
– • Explain secure architecture and design elements and patterns, architectural risk assessment, threat modeling, threat intelligence, and attack surface evaluation.
– • Explain security architecture and control identification, prioritization, and positioning.
– • Apply secure coding practices, analyze code for security risks, and implement security controls.
– • Discuss third-party code and libraries, software composition analysis, and security of the build process.
– • Discuss security testing strategy plans and analyze security testing methods.
– • Discuss validation and verification, security test results, and tracking security errors.
– • Describe secure software integration and deployment, security data, and post-deployment security testing.
– • Recognize various security-relevant maintenance activities and discuss planning for the continuity of operations.
– • Discuss software supply chain risks and analyze the security of third-party software.
– • Explain supplier security requirements in the acquisition process and support for contractual requirements.
No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.
• Secure Software Lifecycle and Risk Management Domain
• Secure Software Lifecycle and Risk Management Domain
• Secure Software Lifecycle and Risk Management Domain
• Secure Software Lifecycle and Risk Management Domain
• Secure Software Lifecycle and Risk Management Domain
• Chapter 1: Secure Software Concepts Domain
• Chapter 1: Secure Software Concepts Domain
• Chapter 1: Secure Software Concepts Domain
• Chapter 1: Secure Software Concepts Domain
• Chapter 1: Secure Software Concepts Domain
• Secure Software Requirements Domain
• Secure Software Requirements Domain
• Secure Software Requirements Domain
• Secure Software Requirements Domain
• Secure Software Requirements Domain
• Secure Software Architecture and Design Domain
• Secure Software Architecture and Design Domain
• Secure Software Architecture and Design Domain
• Secure Software Architecture and Design Domain
• Secure Software Architecture and Design Domain
• Secure Software Deployment, Operations and Maintenance Domain
• Secure Software Deployment, Operations and Maintenance Domain
• Secure Software Deployment, Operations and Maintenance Domain
• Secure Software Deployment, Operations and Maintenance Domain
• Secure Software Deployment, Operations and Maintenance Domain
• Secure Software Supply Chain Domain
• Secure Software Supply Chain Domain
• Secure Software Supply Chain Domain
• Secure Software Supply Chain Domain
• Secure Software Supply Chain Domain
• Applied Scenario Activities
• Applied Scenario Activities
• Applied Scenario Activities
• Applied Scenario Activities
• Applied Scenario Activities
• Secure Software Testing Domain
• Secure Software Testing Domain
• Secure Software Testing Domain
• Secure Software Testing Domain
• Secure Software Testing Domain
• Secure Software Implementation Domain
• Secure Software Implementation Domain
• Secure Software Implementation Domain
• Secure Software Implementation Domain
• Secure Software Implementation Domain
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.