Course contentsShow
Security
Lesson 2033 of 3,05241. Secure Development LifecyclePro lesson

Data Flow Diagrams for Security

Create data flow diagrams that map trust boundaries, data classification, and identify where security controls are needed.

This lesson is for subscribers

You've completed the free preview. Subscribe to unlock every lesson in every course.