Security Software Testing - Workshop eBook


In this workshop, we will be learning about the overall software security testing happening in the field of information security, covering many aspects of security. However, in this module, we will talk about the knowledge base, the basics of software security.

This e-book contains text materials from the course.

Module 1 – The Basics of Software Security

    • Introduction

    • Prerequisites

    • The Software Industry

    • Types of Software

    • What is Security Software?

        • Anti-spyware software

        • Anti-virus software

    • Firewall

    • Some Common Sense

    • Patch Management

    • Secure Coding of Software

Module 2 – Types of Software Security Testing

    • Introduction

    • Software Security Testing

    • Core Values

    • Types of Software Security Testing

    • Front End Testing (FET)

    • End-to-End Testing (E2E)

    • Main Code Testing (MCoT)

    • Techniques or Methodologies

    • Black Box Method

    • White Box Method

        • Example1

        • Example2

    • Security Code Review Tools

Module 3 – Source Code Review Tools & Techniques

    • Introduction

    • Why do we need tools?

    • Leading Source Code Review Tools

        • Flawfinder

        • IBM Rational Software Analyzer

        • Veracode SAST

    • Secure Coding Validation Suite by CERT

    • Microsoft CAT.NET

        • Important Note

Module 4 – Demo Code Review

    • Introduction

    • What is Flawfinder?

    • Vendor’s mouth

    • How does it work?

    • Easy to use

    • Practicing Flawfinder

Module 5 – Security in Software Development Lifecycle

    • Security in software Development

    • What is security in the software development lifecycle?

    • Industry Facts




April 19, 2022
Notify of
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.