Software Applications: Security Lifecycle Threats
In this course students learn about the cradle to grave lifecycle of software applications and how to review for security implications at each stage.
Ever wonder how to apply threat-based thinking to a user- and usability-centered application lifecycle throughout the entire lifecycle? In this course students learn about the cradle to grave lifecycle of software applications and how to review for security implications at each stage. Starting from a product pitch, we walk through the entire product lifecycle, including design, prototyping, testing, deployment, and ongoing management including operational concerns, through to eventual decommission. We look at scenarios drawn from in the market products and development realities.