Claim your FREE 7-day trial

Verification and Validation of Systems or System Modifications

Go through the post-deployments steps of ensuring the system is adequately secure.

2 videos  //  32 minutes of training

Course description

Once you’ve deployed a system, you need to ensure it’s adequately secure based on the stakeholders’ objectives and needs. Learn what’s involved in the validation and verification process, including compliance considerations, testing and evaluation procedures and steps, assurance criteria and approach, and the different assurance levels.

Course syllabus

Verify and Validate System and Modification, Part 1Duration: 12:54

Verify and Validate System and Modification, Part 2Duration: 18:50

Meet the author



At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certification and skills training. We also empower all employees with security awareness training to stay cybersecure at work and home. Driven by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win.

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer

Plans and pricing





$599 / license

Annually. Includes all content plus team admin and reporting.