Secure SDLC
Rated 3.5/5 based on 11 customer reviews

Secure SDLC

Available: Out of Stock
$0.00

Request Info
The Secure SDLC learning path is a step-by-step approach to integrate the security controls into your software or system development life cycle. You will learn how to use each phase to develop or establish both proactive and reactive security controls across your organization.

Skill Assessment

Skill assessment | 20 questions

See how your secure SDLC skills stack up against other professionals in your field.

Secure SDLC Project

Project | 2 hours 27 minutes

Practice your secure SDLC skills by solving challenges.

Introduction to SDLC

Course | 23 minutes

In this course, you’ll be introduced to Secure SDLC, a framework to establish system development by integrating security.

Security Awareness Training

Course | 1 hour 1 minute

Security awareness training is an education process that teaches employees and users about cybersecurity, IT best practices and even regulatory compliance

Secure Requirements

Course | 35 minutes

Secure requirements are security features required by system users or a quality the system must have to increase the user’s trust.

Secure Design

Course | 2 hours

Secure design applies to individual features that can correspond to their respective secure requirements.

Secure Build

Course | 38 minutes

Secure build is a practice to apply the secure requirements and design to the software or system development.

Secure Deploy

Course | 38 minutes

Secure deploy is for the purpose of formalizing and automating the deployment process in a secure way.

Secure Validation

Course | 37 minutes

Secure validation is testing with a hacker’s perspective to check whether the security controls are in place.

Secure Response

Course | 34 minutes

Secure response is a structured methodology for handling security incidents, breaches and cyber threats

Collaborative Model

Course | 25 minutes

The collaborative model, or collaboration, is an approach that applies to a wide variety of systems and has been used to solve the security issues inherent in the enterprise systems or distributed environments.

The Secure SDLC learning path is a step-by-step approach to integrate the security controls into your software or system development life cycle. You will learn how to use each phase to develop or establish both proactive and reactive security controls across your organization.

Skill Assessment

Skill assessment | 20 questions

See how your secure SDLC skills stack up against other professionals in your field.

Secure SDLC Project

Project | 2 hours 27 minutes

Practice your secure SDLC skills by solving challenges.

Introduction to SDLC

Course | 23 minutes

In this course, you’ll be introduced to Secure SDLC, a framework to establish system development by integrating security.

Security Awareness Training

Course | 1 hour 1 minute

Security awareness training is an education process that teaches employees and users about cybersecurity, IT best practices and even regulatory compliance

Secure Requirements

Course | 35 minutes

Secure requirements are security features required by system users or a quality the system must have to increase the user’s trust.

Secure Design

Course | 2 hours

Secure design applies to individual features that can correspond to their respective secure requirements.

Secure Build

Course | 38 minutes

Secure build is a practice to apply the secure requirements and design to the software or system development.

Secure Deploy

Course | 38 minutes

Secure deploy is for the purpose of formalizing and automating the deployment process in a secure way.

Secure Validation

Course | 37 minutes

Secure validation is testing with a hacker’s perspective to check whether the security controls are in place.

Secure Response

Course | 34 minutes

Secure response is a structured methodology for handling security incidents, breaches and cyber threats

Collaborative Model

Course | 25 minutes

The collaborative model, or collaboration, is an approach that applies to a wide variety of systems and has been used to solve the security issues inherent in the enterprise systems or distributed environments.