Secure System Analysis and Design
Posted 2 years 4 months ago by Coventry University
Improve cyber security during development
System design and system specification are crucial stages in the process of software development.
In this course, you will have the chance to explore the first two stages of the software development life cycle, focusing on design principles that can be used to improve the security level of the systems under development.
Upon completion of this course, you’ll understand how to apply formal methods to outline and design your system’s behaviour and reduce potential threats to your information security.
Understand and demonstrate the major principles of secure design
In the first week of this course, you’ll have the opportunity to learn how to identify security risks, and get to grips with the core principles underlying secure design. This includes identifying system threats, vulnerabilities, and risks before moving onto finding solutions to mitigate against them.
Explore modes of formal security modelling and specifications
Once you’ve understood how to identify threats, you’ll move onto applying formal processes to decide and design your system’s behaviour. This includes building your confidence in reviewing appropriate core security processes for your systems and prepares you for implementation.
Once you’ve completed this course, you’ll be ready to apply secure system design principles and move onto building your skills in development.
This course is suited to people looking to increase their understanding of software development lifecycle and security considerations. It has been designed for security analysts, security architects, software developers, and aspiring security specialists.
If you wish to deepen your understanding further, you may be interested in these courses from the same provider. They share similar subjects and the same overall learning outcomes:
This course is suited to people looking to increase their understanding of software development lifecycle and security considerations. It has been designed for security analysts, security architects, software developers, and aspiring security specialists.
If you wish to deepen your understanding further, you may be interested in these courses from the same provider. They share similar subjects and the same overall learning outcomes:
- Identify threat, vulnerability and risk concepts
- Demonstrate use of secure design principles
- Evaluate human factors in system security
- Explore security needs of various systems
- Assess appropriate core security measures for the systems
- Identify model system behaviour using formal methods and tools