No internet? No problem! Download any course on the Alison App and learn on the go. 📲 Download Courses &
Learn Without Internet Coming soon to iOS

Your Learner Verification

This is to verify that K.A.K.N Jayasinghe has completed the course Secure Software: Deployment and Acquisition on Alison.

K.A.K.N Jayasinghe

Alison ID: 39115873

Course Completed: Secure Software: Deployment and Acquisition

Date Of Completion: 24th May 2024

Email: kavindujayasinghe2002122@gmail.com

Total Study Time: 0h 46m

Final Assessment Score:

Alison courses requires at least
80% to pass the final assessment

96%
CPD Hours Completed:

CPD approved learning hours
completed through this course

0-1h

Course Information

Learn how to acquire, operate and maintain secure software that can resist cyber attacks in this free online course.

‘Configuration management’ drives the monitoring and maintenance of information about all the resources needed to deliver software services. However, there are security considerations that you need to know to effect proper configuration management both pre and post-installation. This cyber security course explains how to maintain operations security to keep the software's resilience levels above acceptable risk levels in terms of operations and maintenance. We discuss software disposal, backups, recovery, archiving, incident management, root cause analysis, change management, patch management and security monitoring.

When it comes to the software acquisition lifecycle, you want to ensure that software meets security requirements and functions as intended even when under cyber attack. This course studies the phases of software acquisition. We then explore the relationship between buyer and supplier in terms of supplier risk management before outlining the risks of not performing a proper assessment of software suppliers. We also cover intellectual property, service level agreements and chain of custody.

Software audits offer proof of compliance with established security requirements. A software audit normally comprises five phases and we go through each in detail while identifying their different types. Organisations must make sure that the security measures specified in the ‘statement of work’ are both present and functional. The course also covers software maintenance, support and sustainment controls. Software needs to be correctly integrated throughout an organisation to ensure cyber security and effectiveness. Instances of network security outages and interruptions can be decreased by following a well-organised software deployment and procurement strategy. This course is ideal for software developers and provides valuable cyber security skills you can use to keep networks and data secure.

Modules Completed

Module 1: Secure Software Management and Acquisition
Module 2: Course assessment

Tell us why you need your learner verification?



Edit Photo

preview