Course Description
Software Assurance Fundamentals 3-Day Course
This 3-day course provides participants with a high-level overview of various aspects of Software Assurance in the context of a modern and Internet-connected environment. Through lecture, hands-on exercises, and group discussion, you will gain a foundational perspective on the challenges of security software design and procurement, program, implementing secure software, and other factors needed for a comprehensive software assurance solution. Upon completion of this course, each participant will be able to define software assurance terminology, compliance requirements, review software assurance principles, and gain an understanding of the impact of current threat trends on security software implementation.
Secure assurance refers to the ability to ensure security personnel, software implementers, purchasers, and users that they can have a level of confidence that software will consistently operate in accordance with its intended goals. It includes software security, which is the process by which the software can operate effectively and security even when it comes under attack. Ideally, assured software will not contain faults or weaknesses that can be exploited either by human attackers or by the insertion (intentional or unintentional) of malicious or poor code.
Course includes the following takeaway items: a printed training book and a CD that includes reference materials pertaining to the course
NICE Work Roles
Information Systems Security Developer
Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.
Software Developer
Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.
Secure Software Assessor
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Course Modules
- Module 1 - Introduction to Software Assurance
- Module 2 – Why is Software at Risk
- Module 3 – Requirements for Secure Software
- Module 4 – SwA Initiatives, Activities, and Organizations
- Module 5 – Final Practical Exam/CAPSTONE Exercise
Image Gallery
No image gallery for this course as of yet.
Course Video
No video for this course as of yet.
Need more information on this course?
Course Overview
Related Courses
Course Testimonials
“It has been a great experience learning RMF by the way of the instructor, Ashely Roan who was very knowledgeable in the field. Thank you for making the course enjoyable, relatable and memorable!”
Ashanta Gamble
“Instruction was first rate. Lunarline worked with my organization in a flexible manner allowing me to obtain the training as required. I enjoyed the instructor- knowledgeable, personable, professional, entertaining and impressive.”
Kevin Shaffer
“Excellent learning experience. Many classes taken over my career, this class offered a “real” world approach to a new methodology. Easy to follow, repetitious in the right areas. Excellent coverage of material at appropriate pace. Real world example were good!”
Deedie Weaver
“The class was excellent! I will continue to take classes from Lunarline in the future. The course material being loaded on a tablet was also a great idea because this will be a great resource to have in my future meetings.”
Nakia Jackson