22.12.2012 Views

SwA in Education, Training & Certification - US-Cert

SwA in Education, Training & Certification - US-Cert

SwA in Education, Training & Certification - US-Cert

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Conclusion<br />

The goal of this pocket guide is to promote the development of educational and tra<strong>in</strong><strong>in</strong>g materials and programs to<br />

prepare a workforce more capable of secur<strong>in</strong>g software and applications.<br />

This pocket guide compiles software assurance education and tra<strong>in</strong><strong>in</strong>g resources aimed to ensure adequate coverage<br />

of requisite knowledge areas and the correspond<strong>in</strong>g roles <strong>in</strong> the workforce. In do<strong>in</strong>g so it draws upon contribut<strong>in</strong>g<br />

discipl<strong>in</strong>es such as software eng<strong>in</strong>eer<strong>in</strong>g (<strong>in</strong>clud<strong>in</strong>g its many sub-discipl<strong>in</strong>es, such as programm<strong>in</strong>g), systems<br />

eng<strong>in</strong>eer<strong>in</strong>g and analysis, project management, etc., to identify and acquire competencies associated with secure<br />

software.<br />

The Software Assurance Pocket Guide Series is developed <strong>in</strong> collaboration with the <strong>SwA</strong> Forum and Work<strong>in</strong>g Groups<br />

and provides summary material <strong>in</strong> a more consumable format. The series provides <strong>in</strong>formative material for <strong>SwA</strong><br />

<strong>in</strong>itiatives that seek to reduce software vulnerabilities, m<strong>in</strong>imize exploitation, and address ways to improve the rout<strong>in</strong>e<br />

development, acquisition and deployment of trustworthy software products. Together, these activities will enable more<br />

secure and reliable software, software that supports mission requirements across enterprises and the critical<br />

<strong>in</strong>frastructure.<br />

For additional <strong>in</strong>formation or contribution to future material and/or enhancements of this pocket guide, please consider<br />

jo<strong>in</strong><strong>in</strong>g any of the <strong>SwA</strong> Work<strong>in</strong>g Groups and/or send comments to Software.Assurance@dhs.gov. <strong>SwA</strong> Forums are<br />

open to all participants and free of charge. Please visit https://buildsecurity<strong>in</strong>.us-cert.gov for further <strong>in</strong>formation.<br />

No Warranty<br />

This material is furnished on an “as-is” basis for <strong>in</strong>formation only. The authors, contributors, and participants of the<br />

<strong>SwA</strong> Forum and Work<strong>in</strong>g Groups, their employers, the U.S. Government, other participat<strong>in</strong>g organizations, all other<br />

entities associated with this <strong>in</strong>formation resource, and entities and products mentioned with<strong>in</strong> this pocket guide make<br />

no warranties of any k<strong>in</strong>d, either expressed or implied, as to any matter <strong>in</strong>clud<strong>in</strong>g, but not limited to, warranty of fitness<br />

for purpose, completeness or merchantability, exclusivity, or results obta<strong>in</strong>ed from use of the material. No warranty of<br />

any k<strong>in</strong>d is made with respect to freedom from patent, trademark, or copyright <strong>in</strong>fr<strong>in</strong>gement. Reference or use of any<br />

trademarks is not <strong>in</strong>tended <strong>in</strong> any way to <strong>in</strong>fr<strong>in</strong>ge on the rights of the trademark holder. No warranty is made that use<br />

of the <strong>in</strong>formation <strong>in</strong> this pocket guide will result <strong>in</strong> software that is secure. Examples are for illustrative purposes and<br />

are not <strong>in</strong>tended to be used as is or without undergo<strong>in</strong>g analysis.<br />

Repr<strong>in</strong>ts<br />

Any Software Assurance Pocket Guide may be reproduced and/or redistributed <strong>in</strong> its orig<strong>in</strong>al configuration, with<strong>in</strong><br />

normal distribution channels (<strong>in</strong>clud<strong>in</strong>g but not limited to on-demand Internet downloads or <strong>in</strong> various<br />

archived/compressed formats).<br />

Anyone mak<strong>in</strong>g further distribution of these pocket guides via repr<strong>in</strong>ts may <strong>in</strong>dicate on the back cover of the pocket<br />

guide that their organization made the repr<strong>in</strong>ts of the document, but the pocket guide should not be otherwise altered.<br />

These resources have been developed for <strong>in</strong>formation purposes and should be available to all with <strong>in</strong>terests <strong>in</strong> software<br />

security.<br />

For more <strong>in</strong>formation, <strong>in</strong>clud<strong>in</strong>g recommendations for modification of <strong>SwA</strong> pocket guides, please contact<br />

Software.Assurance@dhs.gov or visit the Software Assurance Community Resources and Information Clear<strong>in</strong>ghouse:<br />

https://buildsecurity<strong>in</strong>.us-cert.gov/swa to download this document either format (4”x8” or 8.5”x11”).<br />

Software Assurance Pocket Guide Series:<br />

Life Cycle Support, Volume I – Version 2.2, Mar 16, 2011<br />

Software Assurance <strong>in</strong> <strong>Education</strong>, Tra<strong>in</strong><strong>in</strong>g & <strong><strong>Cert</strong>ification</strong><br />

21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!