Secure Software: Deployment and Acquisition

0
Certificate

Paid

Language

Level

Intermediate

Access

Free

Last updated on June 23, 2025 3:03 pm

This software development course provides the cyber security skills you need to acquire, install and operate software that keeps working during cyber attacks.

Add your review

Network security is one of the top priorities when we install and use software as we look to maintain the integrity of our data and devices. This cyber security course explains how to safeguard the confidentiality and integrity of sensitive information by using tokens, passwords and other methods used to keep applications working in real-world settings. We also trace the phases and lifecycle of software acquisition and development.

What You Will Learn In This Free Course

  • List the security considerations for…
  • Describe how to handle root cause an…
  • Discuss how security monitoring shou…
  • Outline how supplier risk assessment…
  • List the security considerations for configuration management pre and post-installation
  • Describe how to handle root cause analysis
  • Discuss how security monitoring should be handled
  • Outline how supplier risk assessment and management works
  • Define ?service level agreement? (SLA)
  • Explain the chain of custody in software acquisition
  • Estimate the maintenance and support costs of secure software
  • Outline common methods used for the sanitation of devices and media
  • Recall the type of relationship that exists between the buyers and suppliers of software
  • Identify the phases of software acquisition
  • Discuss the role of software audits in ensuring security compliance and outline the phases and types of security audits
  • List standard patching operating procedures and methods
  • Secure Software Management and Acquisition

    Topics you will learn in this module include secure software installation and deployment, operations and maintenance, security monitoring, incident management, root cause analysis, acquisition lifecycle, supplier risk assessment and management, contractual controls, intellectual property, chain of custody and service level agreement.

    Course assessment

    User Reviews

    0.0 out of 5
    0
    0
    0
    0
    0
    Write a review

    There are no reviews yet.

    Be the first to review “Secure Software: Deployment and Acquisition”

    ×

      Your Email (required)

      Report this page
      Secure Software: Deployment and Acquisition
      Secure Software: Deployment and Acquisition
      LiveTalent.org
      Logo
      LiveTalent.org
      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.