Fast pace but good information
Secure Software Requirements
Secure Software Requirements
IT and Software ,Network and Security,
Lectures -17
Resources -3
Duration -59 mins
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
In this course series we cover what secure software design means and why software can meet all quality requirements and still be insecure. There are many benefits of designing security early which we cover in this course. We will cover what we need to be concerned with when procuring software.
Specifically, this course in the series we cover the need for Functional and Non Functional Requirements, Identifying Security Requirements, Policy Decomposition, Data Classification, Subject Object Matrix, Use Case and Misuse Case Modeling, Regulatory and Industry Requirements, Legal Requirements, Privacy Requirements and what a Security Requirements Traceability Matrix which a developer should be familiar with.
Who should take this course (Target Audience)?
- You are a developer or software engineer and want to understand
- You want to learn IT security fundamentals focused on software development
Goals
- Understand the best practices around software development
- Learn how to develop secure software
- Understand the basics of the SDLC
- Understand the Secure Design Process
- Learn about the Threat Models and Attack Trees
Prerequisites
- There are no course pre-requirements

Curriculum
Check out the detailed breakdown of what’s inside the course
Secure Software Requirements
17 Lectures
-
Course Overview 02:30 02:30
-
Downloadable Files
-
Instructor Intro 01:07 01:07
-
Course Prereqs 00:43 00:43
-
Functional and Non Functional Requirements 04:54 04:54
-
Identifying Security Requirements 01:47 01:47
-
Policy Decomposition 04:38 04:38
-
Data Classification 06:28 06:28
-
Subject Object Matrix 02:10 02:10
-
Use Case and MisUse Case Modeling 04:51 04:51
-
Regulatory and Industry Requirements 14:46 14:46
-
Legal Requirements 03:45 03:45
-
Privacy Requirements 05:31 05:31
-
Security Requirements Traceability Matrix 01:43 01:43
-
Course Review 02:07 02:07
-
Course Review Questions 01:13 01:13
-
Course Closeout 01:13 01:13
Instructor Details

Stone River eLearning
At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development, business or soft skills - we have it covered.
Check out our huge catalog of courses and join the over 3.2M students currently taking Stone River eLearning courses. We can provide all or part of this catalog to any business via API connection, or you can get your own branded LMS free with 10+ users.
Course Certificate
Use your certificate to make a career change or to advance in your current career.

Our students work
with the Best


































Feedbacks
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now