Offline Application Security Testing Essential Training

Offline Application Security Testing Essential Training

.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 3h 22m | 365 MB

Instructor: Jerod Brennen
Building security testing into the software development life cycle is the best way to protect your app and your end users. This course identifies tools and techniques that developers can use to minimize the cost and impact of security testing-while maximizing its impact and effectiveness. In this course, instructor Jerod Brennen focuses on offline testing activities: preparing test plans, policies, and other documentation and conducting offline source code reviews. He also explains how to conduct offline testing for the OWASP Top Ten vulnerabilities. Along the way, you can become familiar with best practices around security in the SDLC. The hands-on sections-with demos of popular tools such as Codacy and SonarQube-prepare you to apply the lessons in the real world.

Topics include:

Security frameworks
OWASP Top Ten
Building Security In Maturity Model (BSIMM)
Planning your testing projects
Creating security policies
Source code reviews
Application threat modeling
Offline testing for OWASP Top Ten vulnerabilities

Download:

http://longfiles.com/25m4x1uql3mp/Offline_Application_Security_Testing_Essential_Training.rar.html

[Fast Download] Offline Application Security Testing Essential Training


Related eBooks:
Advances in Digital Forensics XV
The New Frontiers of Space: Economic Implications, Security Issues and Evolving Scenarios
Advances in Information and Computer Security
Echtzeit und Sicherheit: Echtzeit 2018
Survey of Text Mining II: Clustering, Classification, and Retrieval
Security of Mobile Communications
CCNA Security 210-260 Official Cert Guide
Principles of Secure Processor Architecture Design
The Mobile Application Hacker's Handbook
Locks, Safes and Security: An International Police Reference (2 volume set)
T. Bradley - Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Android Application Security: A Semantics and Context-Aware Approach [repost]
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.