Secure Software: Deployment and Acquisition

Other
Alison

Course details

Course description

Network security is one of the top priorities when we install and use software as we look to maintain the integrity of our data and devices. This cyber security course explains how to safeguard the confidentiality and integrity of sensitive information by using tokens, passwords and other methods used to keep applications working in real-world settings. We also trace the phases and lifecycle of software acquisition and development.

‘Configuration management’ drives the monitoring and maintenance of information about all the resources needed to deliver software services. However, there are security considerations that you need to know to effect proper configuration management both pre and post-installation. This cyber security course explains how to maintain operations security to keep the software's resilience levels above acceptable risk levels in terms of operations and maintenance. We discuss software disposal, backups, recovery, archiving, incident management, root cause analysis, change management, patch management and security monitoring.

When it comes to the software acquisition lifecycle, you want to ensure that software meets security requirements and functions as intended even when under cyber attack. This course studies the phases of software acquisition. We then explore the relationship between buyer and supplier in terms of supplier risk management before outlining the risks of not performing a proper assessment of software suppliers. We also cover intellectual property, service level agreements and chain of custody.

Software audits offer proof of compliance with established security requirements. A software audit normally comprises five phases and we go through each in detail while identifying their different types. Organisations must make sure that the security measures specified in the ‘statement of work’ are both present and functional. The course also covers software maintenance, support and sustainment controls. Software needs to be correctly integrated throughout an organisation to ensure cyber security and effectiveness. Instances of network security outages and interruptions can be decreased by following a well-organised software deployment and procurement strategy. This course is ideal for software developers and provides valuable cyber security skills you can use to keep networks and data secure.

Provided by

Entry requirements

Please contact the course provider for details.

Course options

Course details

Online

Check with the course provider for dates.

Cost: £0.00 (ex. VAT)

Venue details

This is the main contact address for the provider. This may not be the location where this course is presented.