This week we shall:
Apply techniques to capture security requirements as part of the software development process.
Apply modelling techniques to identify threats and vulnerabilities in networks and software.
Employ industry-standard methods to isolate the different types of threats.
On completion of this week you will be able to:
Develop solutions that will efficiently identify vulnerabilities and threats in software and over networks.
Develop security requirement documents to ensure security is embedded in a software development process.
Develop the capacity to predict security issues in software and develop appropriate solutions to deal with them.