Implementing Security Activities across the Technology Life Cycle

placeholder

Discover how to implement security activities across technology and software development life cycles. In this course you will explore system DLC requirements acquisition testing and evaluation. Review system DLC operations monitoring and maintenance. Study system DLC configuration and change management asset management and inventory control. Examine software DLC applications and software assurance software DLC NX/XN bit ASLR and code quality. Consider software DLC testing and DevOps. Review agile waterfall and spiral software development. Identify security requirements for a traceability matrix and establish adequate solutions adaptation. Finally you will complete an exercise to describe life cycle activities.