Security Software Assessments: Security Software Assessments


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this 13-video course, learners will discover techniques used to perform software security assessments and testing, including components of a security assessment, test strategy approaches, security control and software testing, and the security management process. Key concepts covered in this course include the major components of a security assessment and test strategies approaches; security control review methods including log and code reviews; and how to recognize security control testing mechanisms such as code testing. Next, learn the importance of a security management process and its common functions; learn steps to take to properly test software to ensure that it is secure; and learn methods to detect potential software vulnerabilities. Then learn common software vulnerabilities such as buffer overflow and injection flaws; learn how to avoid common software vulnerabilities by using secure coding techniques; and explore steps and techniques to analyze risk. Finally, learn about penetration testing and its purpose; and learn microservices, a mini-application that focuses on a specific task, and application programming interfaces (APIs) and highlight security concerns associated with each.



Expected Duration (hours)
0.9

Lesson Objectives

Security Software Assessments: Security Software Assessments

  • discover the key concepts covered in this course
  • describe the major components of a security assessment and test strategies approaches
  • recognize security control review methods including log and code reviews
  • recognize security control testing mechanisms such as code testing
  • describe the importance of a security management process and its common functions
  • recognize steps to properly test software to ensure it is secure
  • recognize methods to detect potential software vulnerabilities
  • list common software vulnerabilities such as buffer overflow and injection flaws
  • recognize how to avoid vulnerabilities by using secure coding techniques
  • recognize steps and techniques to analyze risk
  • describe penetration testing and its purpose
  • describe microservices and APIs and highlight security concerns associated with each
  • summarize the key concepts covered in this course
  • Course Number:
    it_sassasdj_01_enus

    Expertise Level
    Intermediate