Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Current Issues in Secure Development

Course Cover
compare button icon

Course Features

icon

Duration

2 weeks

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Mobile, Desktop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Effort

5 hours per week

icon

Teaching Type

Self Paced

Course Description

Preparing for your final assessment, you will need to do supported revision. This covers security legislation, secure design principles and formal modelling.

To help you prepare for the ExpertTrack's final assignment, your work will be organized around case scenarios and exercises.

Take a look at the key concepts and reflect upon them. A variety of scenarios will be presented to you that show how cyber security impacts the development cycle of a system and how secure design principles can work in real-life systems.

This course will allow you to refresh your knowledge about developing and implementing secure security systems. Further exercises will be given in formal verification techniques, computation trees logic application and secure programming principles.

After completing this course, you will have an overview of Cyber Security ExpertTrack. You will then be ready for the final assessment to earn your certification.

Course Overview

projects-img

Alumni Network

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Discuss the current security concerns/issues identified in the different stages of the development lifecycle of a system

Discuss the opportunities of applying more accurate and cost-effective testing and verification techniques (eg secure by design approach)

Describe the main testing and formal analysis limitations

Target Students

This ExpertTrack is suited to people looking to increase their understanding of software development lifecycle and security considerations

It has been designed for security analysts, security architects, software developers, and aspiring security specialists

Course Cover