Security Software Assessments
Intermediate
- 13 videos | 55m 59s
- Includes Assessment
- Earns a Badge
In this 13-video course, learners will discover techniques used to perform software security assessments and testing, including components of a security assessment, test strategy approaches, security control and software testing, and the security management process. Key concepts covered in this course include the major components of a security assessment and test strategies approaches; security control review methods including log and code reviews; and how to recognize security control testing mechanisms such as code testing. Next, learn the importance of a security management process and its common functions; learn steps to take to properly test software to ensure that it is secure; and learn methods to detect potential software vulnerabilities. Then learn common software vulnerabilities such as buffer overflow and injection flaws; learn how to avoid common software vulnerabilities by using secure coding techniques; and explore steps and techniques to analyze risk. Finally, learn about penetration testing and its purpose; and learn microservices, a mini-application that focuses on a specific task, and application programming interfaces (APIs) and highlight security concerns associated with each.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the major components of a security assessment and test strategies approachesRecognize security control review methods including log and code reviewsRecognize security control testing mechanisms such as code testingDescribe the importance of a security management process and its common functionsRecognize steps to properly test software to ensure it is secureRecognize methods to detect potential software vulnerabilities
-
List common software vulnerabilities such as buffer overflow and injection flawsRecognize how to avoid vulnerabilities by using secure coding techniquesRecognize steps and techniques to analyze riskDescribe penetration testing and its purposeDescribe microservices and apis and highlight security concerns associated with eachSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 3s
-
4m 23sUpon completion of this video, you will be able to describe the major components of a security assessment and test strategies approaches. FREE ACCESS
-
7m 59sAfter completing this video, you will be able to recognize security control review methods, including log and code reviews. FREE ACCESS
-
6m 27sAfter completing this video, you will be able to recognize security control testing mechanisms, such as code testing. FREE ACCESS
-
5m 23sAfter completing this video, you will be able to describe the importance of a security management process and its common functions. FREE ACCESS
-
3m 30sAfter completing this video, you will be able to recognize steps to properly test software to ensure it is secure. FREE ACCESS
-
5m 3sUpon completion of this video, you will be able to recognize methods for detecting potential software vulnerabilities. FREE ACCESS
-
7m 12sAfter completing this video, you will be able to list common software vulnerabilities, such as buffer overflow and injection flaws. FREE ACCESS
-
3m 44sUpon completion of this video, you will be able to recognize how to avoid vulnerabilities by using secure coding techniques. FREE ACCESS
-
3m 19sAfter completing this video, you will be able to recognize steps and techniques for analyzing risk. FREE ACCESS
-
3m 27sUpon completion of this video, you will be able to describe penetration testing and its purpose. FREE ACCESS
-
2m 34sAfter completing this video, you will be able to describe microservices and APIs and highlight security concerns associated with each. FREE ACCESS
-
56s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.