Description
This course will give you the skills you need to carry out threat assessments throughout your software’s life.
From design and inception through to reviewing legacy systems, this repeatable and structured approach raises our focus from the lines of code we write to the ecosystems and processes we build.
You’ll learn how to understand your systems and their environment, assess your system using a threat assessment methodology, and prioritise your risks and apply defensive controls.