Video Description

This lesson covers information gathering techniques which include: • Brainstorming • Affinity mapping • Facilitated workshops • Surveys and questionnaires (aka the Delphi Technique) • Policy decomposition • Requirements traceability • PNE • Use and misuse case

Course Modules

ISC2 Certified Secure Software Life-cycle Professional (CSSLP)