Cybersecurity
- Evaluate the major steps, underlying theory, and relative usefulness of software security testing, white box and black box software security testing, the Common Criteria/Common Criteria Evaluation and Validation Scheme (CCEVS), and the Common Criteria (CC) for Information Technology Security Evaluation.
- Identify and evaluate state and federal cybersecurity policies underlying the application, scope, and selection of secure software development methodologies.
- Determine when to perform a risk analysis
- Evaluate security concerns that arise during the acceptance phase of software development.
- Describe the testing and validation process from a cybersecurity policy standpoint.
- Identify the ways in which SwA ensures trustworthiness, predictable execution, and conformance.
- Identify SwA best practices.
- Identify innovations in the provision of SwA that you have found in your research.