CISSP: 25 - Software Security Solutions
Upon completion of this course, you will be able to:
- explain important principles regarding software security assessment, which maps to CISSP objective 8.3.
- describe auditing and logging, risk analysis and mitigation, and acceptance testing
- explain security impact of required software, which maps to CISSP objective 8.4
- detail software vulnerabilities, software features that are common in various systems, and the assessment tools that are available to evaluate the different software that is out there
SUBJECT MATTER EXPERT: Tom Carpenter