This course introduces you to the deployment phase of the software development lifecycle, which includes adhering to application security principles, defending critical software infrastructure such as the operating system, web servers, and databases, and creating a security incident response plan.
On successful completion of this course, learners should have the knowledge and skills to identify security best practices for deployment, including:
- Using secure defaults
- Applying the principle of least privilege
- Configuring operating systems, Web servers, and databases securely