Security Software Assessments

Intermediate
  • 13 videos | 55m 59s
  • Includes Assessment
  • Earns a Badge
Likes 9 Likes 9
In this 13-video course, learners will discover techniques used to perform software security assessments and testing, including components of a security assessment, test strategy approaches, security control and software testing, and the security management process. Key concepts covered in this course include the major components of a security assessment and test strategies approaches; security control review methods including log and code reviews; and how to recognize security control testing mechanisms such as code testing. Next, learn the importance of a security management process and its common functions; learn steps to take to properly test software to ensure that it is secure; and learn methods to detect potential software vulnerabilities. Then learn common software vulnerabilities such as buffer overflow and injection flaws; learn how to avoid common software vulnerabilities by using secure coding techniques; and explore steps and techniques to analyze risk. Finally, learn about penetration testing and its purpose; and learn microservices, a mini-application that focuses on a specific task, and application programming interfaces (APIs) and highlight security concerns associated with each.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    describe the major components of a security assessment and test strategies approaches
    recognize security control review methods including log and code reviews
    recognize security control testing mechanisms such as code testing
    describe the importance of a security management process and its common functions
    recognize steps to properly test software to ensure it is secure
    recognize methods to detect potential software vulnerabilities
  • list common software vulnerabilities such as buffer overflow and injection flaws
    recognize how to avoid vulnerabilities by using secure coding techniques
    recognize steps and techniques to analyze risk
    describe penetration testing and its purpose
    describe microservices and APIs and highlight security concerns associated with each
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1.  Course Overview
    2m 3s
  • Playable
    2.  Security Assessments and Test Strategies
    4m 23s
    Upon completion of this video, you will be able to describe the major components of a security assessment and test strategies approaches. FREE ACCESS
  • Locked
    3.  Security Control Reviews
    7m 59s
    After completing this video, you will be able to recognize security control review methods, including log and code reviews. FREE ACCESS
  • Locked
    4.  Security Control Testing
    6m 27s
    After completing this video, you will be able to recognize security control testing mechanisms, such as code testing. FREE ACCESS
  • Locked
    5.  Security Management Process
    5m 23s
    After completing this video, you will be able to describe the importance of a security management process and its common functions. FREE ACCESS
  • Locked
    6.  Software Testing
    3m 30s
    After completing this video, you will be able to recognize steps to properly test software to ensure it is secure. FREE ACCESS
  • Locked
    7.  Detecting Vulnerabilities in Software
    5m 3s
    Upon completion of this video, you will be able to recognize methods for detecting potential software vulnerabilities. FREE ACCESS
  • Locked
    8.  Common Vulnerabilities
    7m 12s
    After completing this video, you will be able to list common software vulnerabilities, such as buffer overflow and injection flaws. FREE ACCESS
  • Locked
    9.  Secure Coding Techniques
    3m 44s
    Upon completion of this video, you will be able to recognize how to avoid vulnerabilities by using secure coding techniques. FREE ACCESS
  • Locked
    10.  Security Risk
    3m 19s
    After completing this video, you will be able to recognize steps and techniques for analyzing risk. FREE ACCESS
  • Locked
    11.  Penetration Testing
    3m 27s
    Upon completion of this video, you will be able to describe penetration testing and its purpose. FREE ACCESS
  • Locked
    12.  Microservices and APIs
    2m 34s
    After completing this video, you will be able to describe microservices and APIs and highlight security concerns associated with each. FREE ACCESS
  • Locked
    13.  Course Summary
    56s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 42 Likes 42  
Likes 137 Likes 137  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 748 Likes 748  
Likes 114 Likes 114