Secure Software: Deployment and Acquisition
This software development course provides the cyber security skills you need to acquire, install and operate software that keeps working during cyber attacks.
Network security is one of the top priorities when we install and use software as we look to maintain the integrity of our data and devices. This cyber security course explains how to safeguard the confidentiality and integrity of sensitive information by using tokens, passwords and other methods used to keep applications working in real-world settings. We also trace the phases and lifecycle of software acquisition and development.
What You Will Learn In This Free Course
Secure Software Management and Acquisition
Topics you will learn in this module include secure software installation and deployment, operations and maintenance, security monitoring, incident management, root cause analysis, acquisition lifecycle, supplier risk assessment and management, contractual controls, intellectual property, chain of custody and service level agreement.
Course assessment
User Reviews
Be the first to review “Secure Software: Deployment and Acquisition”
You must be logged in to post a review.
There are no reviews yet.