This is to verify that K.A.K.N Jayasinghe has completed the course Secure Software: Deployment and Acquisition on Alison.
Alison ID: 39115873
Course Completed: Secure Software: Deployment and Acquisition
Date Of Completion: 24th May 2024
Email: kavindujayasinghe2002122@gmail.com
Total Study Time: 0h 46m
Alison courses requires at least
80% to pass the final assessment
CPD approved learning hours
completed through this course
Learn how to acquire, operate and maintain secure software that can resist cyber attacks in this free online course.
‘Configuration management’ drives the monitoring and maintenance of information about all the resources needed to deliver software services. However, there are security considerations that you need to know to effect proper configuration management both pre and post-installation. This cyber security course explains how to maintain operations security to keep the software's resilience levels above acceptable risk levels in terms of operations and maintenance. We discuss software disposal, backups, recovery, archiving, incident management, root cause analysis, change management, patch management and security monitoring.
When it comes to the software acquisition lifecycle, you want to ensure that software meets security requirements and functions as intended even when under cyber attack. This course studies the phases of software acquisition. We then explore the relationship between buyer and supplier in terms of supplier risk management before outlining the risks of not performing a proper assessment of software suppliers. We also cover intellectual property, service level agreements and chain of custody.
Software audits offer proof of compliance with established security requirements. A software audit normally comprises five phases and we go through each in detail while identifying their different types. Organisations must make sure that the security measures specified in the ‘statement of work’ are both present and functional. The course also covers software maintenance, support and sustainment controls. Software needs to be correctly integrated throughout an organisation to ensure cyber security and effectiveness. Instances of network security outages and interruptions can be decreased by following a well-organised software deployment and procurement strategy. This course is ideal for software developers and provides valuable cyber security skills you can use to keep networks and data secure.