Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Online Application Security Testing Essential Training

via LinkedIn Learning

Overview

Embed security into the software development life cycle. Discover how to use online security testing to validate your code and uncover vulnerabilities.

Building security testing into the software development life cycle is the best way to protect your app and your end users. This course identifies tools and techniques that developers can use to minimize the cost and impact of security testing—while maximizing its impact and effectiveness. In this course, instructor Jerod Brennen focuses on online testing, using security scanning, penetration testing, and vulnerability testing to validate code and uncover vulnerabilities. He explains the difference between positive and negative, manual and automated, and production and nonproduction testing, so you can choose the right kind for your workflow. The hands-on sections—with demos of popular tools such as Fiddler, Burp Suite, and OWASP OWTF—prepare you to apply the lessons in the real world.

Syllabus

Introduction
  • The importance of online testing
  • What you should know
1. Security Testing in QA
  • Software quality assurance process
  • Positive testing
  • Negative testing
  • SQA metrics
  • OWASP Testing Guide
  • Demo: OWASP ZAP
2. Assessing Deployed Apps
  • Manual vs. automated testing
  • Scanning vs. pen testing
  • Testing in non-production
  • Testing in production
  • OSINT gathering
  • Web app proxies
  • Demo: Fiddler2
  • Demo: Burp Suite
  • Demo: Samurai Web Testing Framework (WTF)
3. Web App Pen Testing
  • Scoping a web app pen test
  • Avoiding production impacts
  • The penetration testing execution standard
  • Types of pen tests
  • Web application firewalls
  • SIEMs
  • Purple teaming
  • Demo: OWASP OWTF
4. Testing for the OWASP Top Ten (2017)
  • The OWASP Top Ten
  • A1: Injection
  • A2: Broken authentication
  • A3: Sensitive data exposure
  • A4: XML external entities (XXE)
  • A5: Broken access control
  • A6: Security misconfiguration
  • A7: Cross-site scripting (XSS)
  • A8: Insecure deserialization
  • A9: Using components with known vulnerabilities
  • A10: Insufficient logging and monitoring
Conclusion
  • Next steps

Taught by

Jerod Brennen

Reviews

Start your review of Online Application Security Testing Essential Training

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.