In the software security development life cyle process, threat modeling occurs in which phase?
A.
Design
B.
Requirements
C.
Verification
D.
Implementation
In the software security development life cyle process, threat modeling occurs in which phase?
In the software security development life cyle process, threat modeling occurs in which phase?
A.
Design
B.
Requirements
C.
Verification
D.
Implementation
How is related to CEH??
I know this is a question that would show up in the CISSP exam. I don’t recall ever learning about SDLC in the official CEH course.