Fundamentals of Secure Coding and how to Break Software
by Ken van Wyk download a PDF brochure
Description
Everyone, whether they write protocols or internal processes is responsible for using Secure Coding techniques to minimize the adverse effects of attacks, whether those attacks are intentional or accidental. If a process deep in the bowels of a product crashes because it receives bad data or because a resource that should have been there was not, it is still a crash and reduces the availability of the product.
Everyone, whether they write protocols or internal processes is responsible for using Secure Coding techniques to minimize the adverse effects of attacks, whether those attacks are intentional or accidental. If a process deep in the bowels of a product crashes because it receives bad data or because a resource that should have been there was not, it is still a crash and reduces the availability of the product.
The second part of the class introduces you to "How To Break Software," a 17-step methodology to effectively and efficiently test software. You will learn a very applied and non-rigid approach to test software for common bugs. It's a departure from conventional testing in which testers prepare a written test plan and then use it as a script when testing the software.
The class teaches you how to plan tests "on the fly" by providing you with insight, experience, and a nose for where bugs are hiding. This class has hands-on component so that you can explore the testing techniques and software tools using real software.
What you will learn
- A 17-step methodology and models for effective software testing
- A plan for on-the-fly testing
- How to develop an insight to find those hard-to-find bugs
- How to test Inputs and Outputs from the User Interface
- How to test Data and Computation from the User Interface
- How to test the File System Interface
- How to test the Software/OS Interface
- How to use Holodeck Lite to inject faults for File System and OS testing
Main Topics
1° Part: Secure Coding
- Introduction to the Software Security
- Web Vulnerabilities
- Defensive Coding Principles
- Security Testing and Quality Assurance
2° part: How to Break Software
- Understanding the environment
- Software Capabilities
- Software Testing
- An overview of the Methodology of How To Break Software