Want to keep learning?

This content is taken from the Coventry University & Institute of Coding's online course, Cyber Security in the Software Development Life Cycle. Join the course to learn more.

Welcome to Week 2

We hope you enjoyed your learning journey in Week 1. During the second week of this course, you will explore common security practices and standards used in more recent times, including the legal and ethical considerations involved in the development of secure computer systems.

This week

Through this week’s activities, you will explore:

  • The concept of standard organisations and the standardisation process
  • How the application of existing security standards can ensure the implementation of high-level security during the development of computer systems
  • Current national and international legislation and regulations associated with data protection
  • Legal and regulatory compliance with respect to the development of computer systems that store, process and exchange data

Your task

Now that you have a clear overview of the second week of the short course, tell us how you think the knowledge to be acquired this week will help you answer our big question:

Is it practically possible to develop a fully secure system through the application of standards and legislation alone?

Share this article:

This article is from the free online course:

Cyber Security in the Software Development Life Cycle

Coventry University