Concepts and Requirement
Learn how to secure software and prevent malware attacks that can seriously harm any software while jeopardizing availability, integrity and authentication.
Software bugs and errors are a typical occurrence in software development and deployment. They may however affect the functioning of software systems and thus exposing organisational data. This course discusses the various concepts and requirements a developer needs to take into account to ensure secure software including the implementation of CIA triad model. Secure software protects critical data and digital experiences from unauthorised access
What You Will Learn In This Free Course
Concepts and Requirements for Secure Software
Topics discussed in this module include but are not limited to the CIA triad, authentication, authorization and accountability (AAA), handling encryption in software, the principle of least privilege, least common mechanism, identifying security requirements, functional and non-functional requirements, and security requirements traceability matrix.
Course assessment
User Reviews
Be the first to review “Concepts and Requirement”
You must be logged in to post a review.
There are no reviews yet.