Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Secure System Analysis and Design

Course Cover
compare button icon

Course Features

icon

Duration

2 weeks

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Mobile, Desktop

icon

Language

English

icon

Subtitles

English

icon

Level

Advanced

icon

Effort

5 hours per week

icon

Teaching Type

Self Paced

Course Description

Software development begins with system design and specification.

This course will allow you to learn about the first two stages in the software development cycle. It will also focus on design principles that can improve security of systems being developed.

This course will teach you how to use formal methods to design and outline your system's behavior and minimize potential threats to information security.

This course will teach you how to identify security threats and the fundamental principles that underlie secure design. This involves identifying system risks, vulnerabilities, and threats before finding ways to mitigate them.

Once you have mastered the art of identifying threats, you can move on to formal processes for deciding and designing your system's behavior. This involves building your confidence by reviewing core security processes and preparing you for implementation.

After completing this course, your knowledge will allow you to use secure system design principles.

Course Overview

projects-img

Alumni Network

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Identify threat, vulnerability and risk concepts

Demonstrate use of secure design principles

Evaluate human factors in system security

Explore security needs of various systems

Assess appropriate core security measures for the systems

Identify model system behaviour using formal methods and tools

Target Students

This ExpertTrack is suited to people looking to increase their understanding of software development lifecycle and security considerations

It has been designed for security analysts, security architects, software developers, and aspiring security specialists

Course Cover