Unable to find what you're searching for?
We're here to help you find itSoftware Development: Requirements, Design, and Reuse (LFD104x) Course Overview
This course discusses the basics of security, such as what risk management really means. It discusses how to consider security as part of the requirements of a system, and what potential security requirements you might consider. This part then focuses on how to design software to be secure, including various secure design principles that will help you avoid bad designs and embrace good ones. It also considers how to secure your software supply chain, that is, how to more securely select and acquire reused software (including open source software) to enhance security.
Purchase This Course
USD
View Fees Breakdown
Flexi Video | 16,449 |
Official E-coursebook | |
Exam Voucher (optional) | |
Hands-On-Labs2 | 4,159 |
+ GST 18% | 4,259 |
Total Fees (without exam & Labs) |
22,359 (INR) |
Total Fees (with exam & Labs) |
28,359 (INR) |
♱ Excluding VAT/GST
You can request classroom training in any city on any date by Requesting More Information
♱ Excluding VAT/GST
You can request classroom training in any city on any date by Requesting More Information
Prerequisites for Software Development: Requirements, Design, and Reuse (LFD104x)
To successfully undertake and fully benefit from this course, we recommend that students have the following foundational knowledge:
These prerequisites are designed to ensure you are well-prepared to grasp the course material and apply the security principles and best practices discussed.
Course Introduction and Target Audience
The "Software Development: Requirements, Design, and Reuse (LFD104x)" course helps developers gain essential security knowledge to protect their software against attacks and ensures a quick response to vulnerabilities.
Job Roles and Audience for the Course
Introduction: The "Software Development: Requirements, Design, and Reuse (LFD104x)" course provides an overview of essential security basics, secure design principles, and best practices. It also emphasizes securely selecting and reusing software components. This course is designed for software developers to enhance their ability to create hardened, secure systems.
Learning Objectives and Outcomes: