Secure Software Testing Secure Software Series Course 5 of 8



Published 1/2023
Created by Joseph Holbrook (The Cloud Tech Guy)
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 15 Lectures ( 56m ) | Size: 380 MB


Understand the critical aspects of secure software design, testing and development.
What you’ll learn
What are the critical aspects of secure development and testing
What are the critical aspects of secure development
Gain insight for the (ISC)² Certified Secure Software Lifecycle Professional (CSSLP) exam would benefit as well
Code analysis, testing and metrics for basing secure development
Requirements
None
Description
Course OverviewIn this course series we cover what secure software design means and why software can meet all quality requirements and still be insecure. Please note that this course is providing introductory concepts for beginners and is NOT a programming course or has any hands on.This course specifically, Secure Software Design is meant to provide learners a foundational start in software design that is focused around security.  The course covers important aspects around the need for Secure Software testing understanding Quality Assurance, Code Analysis and Dependency Scanning  The course continues on to cover Pentration Testing, Fuzzing,  Vulnerability Scanning, Cryptological Validation, Secure Testing Results and Metrics for essons. The course provides some review questions and also summary review Lastly,  the course series covers about 65% or more of the exam objectives for the CSSLP exam when completing all eight courses! There are many benefits of designing security early which we cover in this course.This is a series of courses for learning about "Secure Software Development Fundamentals"Course 1 – Secure Software ConceptsCourse 2 – Secure Software RequirementsCourse 3 – Secure Software DesignCourse 4 – Defining Security ArchitecturesCourse 5 – Secure Software TestingCourse 6 – Secure Software AcceptanceCourse 7 – Software Deployment, Operations and MaintenanceCourse 8 – Supply Chain and Software AcquisitionWho should take this course (Target Audience)?You are a developer or software engineer and want to understandYou want to learn IT security fundamentals focused on software developmentWhat are the Couse Pre Requirements?There are no course pre-requirementWhat You’ll LearnWhat are the critical aspects of secure testingWhat is the code analysis and the typesIdentify the correct software build requirements needed for a secure software programDetermine how to specify the proper software architecture to meet your software security requirementsUnderstand what the commonly accepted best practices are software acceptanceDetermine the proper software acquisition and supply chain requirements for your software programsGet to know the proper software testing procedure for a secure software program.RequirementsNo RequirementsCourse ContentsCourse Overview, Instructor Intro, Course PrereqsMain Modules covered are:  Secure Software Testing Overview Quality Assurance Analyze Code for Vulnerabilities Static Code Analysis Thrid Party Dependency Scanning Pentration Testing Fuzzing Vulnerability Scanning Cryptological Validation Secure Testing Results and MetricsCourse Summary Review Questions Course Closeout
Who this course is for
You want to learn IT security fundamentals focused on software development
ou are a developer or software engineer and want to understand Secure Design Principles
Homepage

https://www.udemy.com/course/secure-software-testing-secure-software-series-course-5-of-8/

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me

Download From 1DL
DOWNLOAD FROM 1DL.NET

DOWNLOAD FROM RAPIDGATOR.NET

DOWNLOAD FROM UPLOADGIG.COM

DOWNLOAD FROM NITROFLARE.COM

Links are Interchangeable – No Password – Single Extraction