Tutorialspoint

April Learning Carnival is here, Use code FEST10 for an extra 10% off

Secure Software Requirements

person icon Stone River ELearning

3.9

Secure Software Requirements

Secure Software Requirements

updated on icon Updated on Apr, 2024

language icon Language - English

person icon Stone River ELearning

English [CC]

category icon IT & Software,Network & Security

Lectures -17

Resources -3

Duration -59 mins

3.9

price-loader

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

In this course series we cover what secure software design means and why software can meet all quality requirements and still be insecure. There are many benefits of designing security early which we cover in this course. We will cover what we need to be concerned with when procuring software.

Specifically, this course in the series we cover the need for Functional and Non Functional Requirements, Identifying Security Requirements, Policy Decomposition, Data Classification, Subject Object Matrix, Use Case and Misuse Case Modeling, Regulatory and Industry Requirements, Legal Requirements, Privacy Requirements and what a Security Requirements Traceability Matrix which a developer should be familiar with.

Who should take this course (Target Audience)?

  • You are a developer or software engineer and want to understand
  • You want to learn IT security fundamentals focused on software development

Goals

What will you learn in this course:

  • Understand the best practices around software development
  • Learn how to develop secure software
  • Understand the basics of the SDLC
  • Understand the Secure Design Process
  • Learn about the Threat Models and Attack Trees

Prerequisites

What are the prerequisites for this course?

  • There are no course pre-requirements
Secure Software Requirements

Curriculum

Check out the detailed breakdown of what’s inside the course

Secure Software Requirements
17 Lectures
  • play icon Course Overview 02:30 02:30
  • play icon Downloadable Files
  • play icon Instructor Intro 01:07 01:07
  • play icon Course Prereqs 00:43 00:43
  • play icon Functional and Non Functional Requirements 04:54 04:54
  • play icon Identifying Security Requirements 01:47 01:47
  • play icon Policy Decomposition 04:38 04:38
  • play icon Data Classification 06:28 06:28
  • play icon Subject Object Matrix 02:10 02:10
  • play icon Use Case and MisUse Case Modeling 04:51 04:51
  • play icon Regulatory and Industry Requirements 14:46 14:46
  • play icon Legal Requirements 03:45 03:45
  • play icon Privacy Requirements 05:31 05:31
  • play icon Security Requirements Traceability Matrix 01:43 01:43
  • play icon Course Review 02:07 02:07
  • play icon Course Review Questions 01:13 01:13
  • play icon Course Closeout 01:13 01:13

Instructor Details

Stone River eLearning

Stone River eLearning

e


Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Feedbacks

C

Christopher Krechkowski

e

Fast pace but good information

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515