Fast pace but good information
Secure Software Requirements
Secure Software Requirements
IT & Software,Network & Security
Lectures -17
Resources -3
Duration -59 mins
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
In this course series we cover what secure software design means and why software can meet all quality requirements and still be insecure. There are many benefits of designing security early which we cover in this course. We will cover what we need to be concerned with when procuring software.
Specifically, this course in the series we cover the need for Functional and Non Functional Requirements, Identifying Security Requirements, Policy Decomposition, Data Classification, Subject Object Matrix, Use Case and Misuse Case Modeling, Regulatory and Industry Requirements, Legal Requirements, Privacy Requirements and what a Security Requirements Traceability Matrix which a developer should be familiar with.
Who should take this course (Target Audience)?
- You are a developer or software engineer and want to understand
- You want to learn IT security fundamentals focused on software development
Goals
What will you learn in this course:
- Understand the best practices around software development
- Learn how to develop secure software
- Understand the basics of the SDLC
- Understand the Secure Design Process
- Learn about the Threat Models and Attack Trees
Prerequisites
What are the prerequisites for this course?
- There are no course pre-requirements
Curriculum
Check out the detailed breakdown of what’s inside the course
Secure Software Requirements
17 Lectures
- Course Overview 02:30 02:30
- Downloadable Files
- Instructor Intro 01:07 01:07
- Course Prereqs 00:43 00:43
- Functional and Non Functional Requirements 04:54 04:54
- Identifying Security Requirements 01:47 01:47
- Policy Decomposition 04:38 04:38
- Data Classification 06:28 06:28
- Subject Object Matrix 02:10 02:10
- Use Case and MisUse Case Modeling 04:51 04:51
- Regulatory and Industry Requirements 14:46 14:46
- Legal Requirements 03:45 03:45
- Privacy Requirements 05:31 05:31
- Security Requirements Traceability Matrix 01:43 01:43
- Course Review 02:07 02:07
- Course Review Questions 01:13 01:13
- Course Closeout 01:13 01:13
Instructor Details
Stone River eLearning
eCourse Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Feedbacks
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now