Internet And Network Technologies
Adapting Pen Testing for Software Development
Pen Testing for Software Development: Penetration Testing SDLC, Team Structure, & Web Services
Pen Testing for Software Development: The Penetration Testing Process

Pen Testing for Software Development: Penetration Testing SDLC, Team Structure, & Web Services

Course Number:
it_apiptsddj_02_enus
Lesson Objectives

Pen Testing for Software Development: Penetration Testing SDLC, Team Structure, & Web Services

  • discover the key concepts covered in this course
  • recognize where penetration testing falls within the software development life cycle
  • differentiate between penetration testing and development
  • identify the importance of developer contributions to penetration testing
  • identify a penetration testing team structure
  • describe the tasks of the penetration testing blue team
  • describe the tasks of the penetration testing red team
  • describe the tasks of the penetration testing purple team
  • describe the importance of performing penetration tests on web services and APIs due to their vulnerabilities
  • identify what is involved in performing penetration tests on APIs
  • recognize the tools available for API penetration testing
  • perform a penetration test on a REST API
  • perform a penetration test using Burp Suite
  • summarize the key concepts covered in this course

Overview/Description

Penetration testing in the Software Development Life Cycle helps create a safe and secure end product and minimizes financial and legal risk. In this course, you値l learn where penetration testing fits in the SDLC, the differences between pen testing and developer, and the importance of developer contributions to pen testing. You値l then examine the pen testing team structure and the tasks of the pen testing blue, red, and purple teams. Next, you値l explore the importance of pen testing web services and APIs, what is involved in API pen testing, and the available tools for pen testing APIs. Lastly, you値l learn how to perform a pen test on a REST API, as well as how to perform a pen test using Burp Suite.



Target

Prerequisites: none

Pen Testing for Software Development: The Penetration Testing Process

Course Number:
it_apiptsddj_01_enus
Lesson Objectives

Pen Testing for Software Development: The Penetration Testing Process

  • discover the key concepts covered in this course
  • describe what penetration testing is
  • recognize the importance of penetration testing
  • describe what system hardening is
  • identify requirements of penetration testing
  • differentiate between penetration testing and vulnerability assessments
  • identify types of penetration testing
  • identify the stages of penetration testing
  • list the different methods of penetration testing
  • recognize the differences between white box, black box, and gray box penetration testing
  • describe the differences in penetration testing methodologies
  • identify the tools available for penetration testing
  • recognize the types of outputs of penetration testing
  • identify penetration testing best practices
  • perform a penetration test
  • summarize the key concepts covered in this course

Overview/Description

Penetration testing can identify both known and unknown vulnerabilities and help avoid security breaches. In this course, you値l learn the importance of penetration testing, what system hardening is, and the requirements of penetration testing. You値l then examine the differences between penetration testing and vulnerability assessments, as well as the various types, stages, and methods of penetration testing. Next, you値l learn about white box, black box, and gray box penetration testing, and the differences in penetration testing methodologies. You値l see the available tools for performing penetration testing, as well as the types of outputs resulting from penetration testing. Lastly, you値l learn about penetration testing best practices and how to perform a penetration test.



Target

Prerequisites: none

Close Chat Live