JUNE 23-27, 2019

CHICAGO, ILLINOIS

FROM BERLIN TO CHICAGO

Join North America's greatest Agile Testing Festival!

Security Testing for Test Professional (2 days)

Explore security testing in an interactive workshop setting. This course is appropriate for software development and testing professionals who want to begin doing security testing as part of their assurance activities.

  • Learn how testing professionals can effectively security test software
  • Discover how applications are developed and tested with security in mind
  • Learn how to use security requirements to plan your testing efforts
  • Explore key aspects of security testing – web security, threat modeling, risk assessment
  • Examine technical and team skills you need for success
  • Learn to use common security testing tools for a variety of testing purposes

 

Course Description
Your organization is doing well with functional, usability, and performance testing. However, you know that software security is a key part of your assurance and compliance strategy for protecting applications and critical data. Left undiscovered, security-related defects can wreak havoc in a system when malicious invaders attack. If you don’t know where to start with security testing and don’t know what you are looking for, this course is for you. It describes how to get started with security testing, introducing foundational security testing concepts and showing you how to apply those security testing concepts with free and commercial tools and resources. Offering a practical risk-based approach, the instructor discusses why security testing is important, how to use security risk information to improve your test strategy, and how to add security testing into your software development lifecycle.

 

Practice of Security Testing
Explore security testing in an informal and interactive workshop setting. Examples are studied through a series of small group exercises and discussions.

 

Who Should Attend?
This course is appropriate for software development and testing professionals who want to begin doing security testing as part of their assurance activities. Test and development managers will benefit from this course as well. A background in software testing is necessary for this course.

 

Course Outline

1. Introduction to Security Testing

  • Information Security Background
  • CIAA++

2. Understanding Software Application Risk

  • The Software Security Problem
  • Understanding Risk
  • Threat Modeling
  • Architecture Risk Analysis
  • Risk Assessment Exercise
  • Prioritizing Security Assurance

3. Application Security Testing Approaches

  • Types of App Security Testing
  • Discovery & Reconnaissance Analysis
  • Vulnerability Scanning
  • Security Assessments
  • Red Teaming
  • Security & Compliance Audit
  • How They Are Similar
  • How They Are Different
  • Reconnaissance and Scanning Demos

4. Security Requirements

  • Functional Security Requirements
  • Non-Functional Security Requirements
  • Addressing Conflicts
  • Identifying Security Requirements
  • Security Requirements Exercise
  • Use and Abuse Cases

5. Security Testing to Thwart Attacks

5.1 Security Testing Authentication

  • Attacks Against AuthenticationSession IDs and Cookies
  • Authentication Testing
  • Race Conditions
  • Session Management
  • Replay Attacks
  • Cross Site Request Forgery (CSRF)
  • Testing Authentication Exercise

5.2 Security Testing Authorization / Access Control

  • Testing Access Control
  • Security Testing Authorization Exercise

5.3 Security Testing Input Fields

  • Input Validation
  • Data Validation
  • Common Attacks
  • Security Testing Input Fields Exercise

5.4 Database Testing for Security

  • Security Testing for Data Storage
  • Security Testing Databases Exercise

 

6. Security Testing Code and Resources

6.1 Integrating Security into Your Testing Process

  • Security in an Agile World
  • Security in a Waterfall World
  • Developing a Security Test Plan
  • Tools to Support Security Testing
  • Security Tools in a DevOps Process
  • Exploiting Vulnerabilities Exercise

7. Wrap Up

Your privacy matters

We use cookies to understand how you use our site and to give you the best experience on our website. If you continue to use this site we will assume that you are happy with it and accept our use of cookies, Privacy Policy and Terms of Use.