From the course: CertNexus Cyber Secure Coder (CSC-110) Cert Prep

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Challenge: Identity requirements

Challenge: Identity requirements

(upbeat music) - No, don't adjust your sets. I know this is a little bit different than if you're watching things in order here. Wait a minute, where's Daniel, what's going on? And in this course, there's going to be these little excerpts where I give you an assignment, go away try, and in the follow-up episode, we'll actually go through them together. Now why am I doing this? You should take some time to think about, well, how do I accomplish X and engage it? Now I don't care if you get it right or wrong, a lot of times, there's not right or wrong answers. But it's about tumbling around with that idea. Now with that said, let me give you your assignment. If we take a look at my screen here, part of this identifying security requirements and some user expectations. I will forewarn you that there are some user stories about this application that maybe you could misconstrue as expectations. But I want to drill down…

Contents