Security Software Assessments

  • 13 Videos | 1h 1m 29s
  • Includes Assessment
  • Earns a Badge
Likes 4 Likes 4
In this 13-video course, learners will discover techniques used to perform software security assessments and testing, including components of a security assessment, test strategy approaches, security control and software testing, and the security management process. Key concepts covered in this course include the major components of a security assessment and test strategies approaches; security control review methods including log and code reviews; and how to recognize security control testing mechanisms such as code testing. Next, learn the importance of a security management process and its common functions; learn steps to take to properly test software to ensure that it is secure; and learn methods to detect potential software vulnerabilities. Then learn common software vulnerabilities such as buffer overflow and injection flaws; learn how to avoid common software vulnerabilities by using secure coding techniques; and explore steps and techniques to analyze risk. Finally, learn about penetration testing and its purpose; and learn microservices, a mini-application that focuses on a specific task, and application programming interfaces (APIs) and highlight security concerns associated with each.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the major components of a security assessment and test strategies approaches
    recognize security control review methods including log and code reviews
    recognize security control testing mechanisms such as code testing
    describe the importance of a security management process and its common functions
    recognize steps to properly test software to ensure it is secure
    recognize methods to detect potential software vulnerabilities
  • list common software vulnerabilities such as buffer overflow and injection flaws
    recognize how to avoid vulnerabilities by using secure coding techniques
    recognize steps and techniques to analyze risk
    describe penetration testing and its purpose
    describe microservices and APIs and highlight security concerns associated with each
    summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE