Video Description

This lesson covers information gathering techniques which include: • Brainstorming • Affinity mapping • Facilitated workshops • Surveys and questionnaires (aka the Delphi Technique) • Policy decomposition • Requirements traceability • PNE • Use and misuse case

Course Modules

ISC2 Certified Secure Software Life-cycle Professional (CSSLP)

Instructed By

Instructor Profile Image
Kelly H

PMP, CISSP, CASP, CEH - Professional Trainer, Top 100 Trainers World-Wide

INSIDER PRO

$99/mo

Subscribe to become an Insider Pro and get access to premium content such as:

Unlimited access to 700+ apps, including virtual labs, practice tests, capture-the-flag challenges, and more
Industry certification preparation
Guided Mentor
Premium support
Subscribe