Stone River Elearning – Secure Software Requirements
In this course series we cover what secure software design means and why software can meet all quality requirements and still be insecure. There are many benefits of designing security early which we cover in this course. We will cover what we need to be concerned with when procuring software.
Specifically, this course in the series we cover the need for Functional and Non Functional Requirements, Identifying Security Requirements, Policy Decomposition, Data Classification, Subject Object Matrix, Use Case and Misuse Case Modeling, Regulatory and Industry Requirements, Legal Requirements, Privacy Requirements and what a Security Requirements Traceability Matrix which a developer should be familiar with.
What will you learn in the course?
- Understand the best practices around software development
- Learn how to develop secure software
- Understand the basics of the SDLC
- Understand the Secure Design Process
- Learn about the Threat Models and Attack Trees
This course is the 2nd course in an 8-part series “Secure Software Developers Series”
Course 1 – Secure Software Concepts
Course 2 – Secure Software Requirements
Course 3 – Secure Software Design
Course 4 – Defining Security Architectures
Course 5 – Secure Software Testing
Course 6 – Secure Software Acceptance
Course 7 – Software Deployment, Operations and Maintenance
Course 8 – Supply Chain and Software Acquisition
Who should take this course (Target Audience)?
- You are a developer or software engineer and want to understand
- You want to learn IT security fundamentals focused on software development
What are the Couse Pre Requirements?
There are no course pre-requirements
Course Curriculum
- Course Overview (2:30)
- Downloadable Files
- Instructor Intro (1:07)
- Course Prereqs (0:43)
- Functional and Non Functional Requirements (4:54)
- Identifying Security Requirements (1:47)
- Policy Decomposition (4:38)
- Data Classification (6:28)
- Subject Object Matrix (2:10)
- Use Case and MisUse Case Modeling (4:51)
- Regulatory and Industry Requirements (14:46)
- Legal Requirements (3:45)
- Privacy Requirements (5:31)
- Security Requirements Traceability Matrix (1:43)
- Course Review (2:07)
- Course Review Questions (1:13)
- Course Closeout (1:13)
Sale Page: https://stoneriverelearning.com/p/secure-software-requirements1
Archive: https://archive.ph/wip/wkAVW
Reviews
There are no reviews yet.