Offline Application Security Testing Essential Training

Go to class
Write Review

Free Online Course: Offline Application Security Testing Essential Training provided by LinkedIn Learning is a comprehensive online course, which lasts for 3-4 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Offline Application Security Testing Essential Training is taught by Jerod Brennen.

Overview
  • Embed security into the software development life cycle. Discover how to use offline security testing to validate your code and uncover vulnerabilities.

    Building security testing into the software development life cycle is the best way to protect your app and your end users. This course identifies tools and techniques that developers can use to minimize the cost and impact of security testing—while maximizing its impact and effectiveness. In this course, instructor Jerod Brennen focuses on offline testing activities: preparing test plans, policies, and other documentation and conducting offline source code reviews. He also explains how to conduct offline testing for the OWASP Top Ten vulnerabilities. Along the way, you can become familiar with best practices around security in the SDLC. The hands-on sections—with demos of popular tools such as Codacy and SonarQube—prepare you to apply the lessons in the real world.

Syllabus
  • Introduction

    • The importance of offline testing
    • What you should know
    1. Leading Practices
    • Security in the SDLC
    • Development methodologies
    • Programming languages
    • Security frameworks
    • Intro to the OWASP Top Ten
    • Other notable OWASP projects
    • Top 25 Software Errors
    • BSIMM
    • Building your test lab
    • Preparing your checklist
    2. Security Documentation
    • Internal project plans
    • Communication planning
    • Change control policy
    • Security incident response policy
    • Logging and monitoring policy
    • Third-party agreements
    • OWASP ASVS
    3. Source Code Security Reviews
    • Challenges of assessing source code
    • OWASP Code Review Project
    • Bytecode scanners
    • Binary code scanners
    • Code review models
    • Application threat modeling
    • Code review metrics
    • Demo: Codacy
    • Demo: SonarQube
    4. Offline Testing for the OWASP Top Ten (2017)
    • The OWASP Top Ten
    • A1: Injection
    • A2: Broken authentication
    • A3: Sensitive data exposure
    • A4: XML external entities (XXE)
    • A5: Broken access control
    • A6: Security misconfiguration
    • A7: Cross-site scripting (XSS)
    • A8: Insecure deserialization
    • A9: Using components with known vulnerabilities
    • A10: Insufficient logging and monitoring
    Conclusion
    • Next steps