Secure Software: Deployment and Acquisition
Course Description
‘Configuration management’ drives the monitoring and maintenance of information about all the resources needed to deliver software services. However, there are security considerations that you need to know to effect proper configuration management both pre and post-installation. This cyber security course explains how to maintain operations security to keep the software's resilience levels above acceptable risk levels in terms of operations and maintenance. We discuss software disposal, backups, recovery, archiving, incident management, root cause analysis, change management, patch management and security monitoring.
When it comes to the software acquisition lifecycle, you want to ensure that software meets security requirements and functions as intended even when under cyber attack. This course studies the phases of software acquisition. We then explore the relationship between buyer and supplier in terms of supplier risk management before outlining the risks of not performing a proper assessment of software suppliers. We also cover intellectual property, service level agreements and chain of custody.
Software audits offer proof of compliance with established security requirements. A software audit normally comprises five phases and we go through each in detail while identifying their different types. Organisations must make sure that the security measures specified in the ‘statement of work’ are both present and functional. The course also covers software maintenance, support and sustainment controls. Software needs to be correctly integrated throughout an organisation to ensure cyber security and effectiveness. Instances of network security outages and interruptions can be decreased by following a well-organised software deployment and procurement strategy. This course is ideal for software developers and provides valuable cyber security skills you can use to keep networks and data secure.
What you'll learn in this course?
-
Software Development
-
Technology
-
Cybersecurity
-
Software Engineering
-
Compliance
-
IT Security
Stone River eLearning
USA
By