SDLC for the DevSecOps Era - Adapting Application Security Techniques

SDLC for the DevSecOps Era - Adapting Application Security Techniques

OWASP Foundation via YouTube Direct link

Technical diagram

9 of 35

9 of 35

Technical diagram

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

SDLC for the DevSecOps Era - Adapting Application Security Techniques

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 interpretive dance
  3. 3 Zanes background
  4. 4 DevOps
  5. 5 Spoiler
  6. 6 What has changed
  7. 7 The real shift
  8. 8 Legacy approaches
  9. 9 Technical diagram
  10. 10 FDL primitives
  11. 11 Common primitives
  12. 12 What do we need to adapt
  13. 13 Static Analysis
  14. 14 Legacy Static Analysis
  15. 15 BottomUp Static Analysis
  16. 16 TopUp Static Analysis
  17. 17 Red Flags
  18. 18 Proactive alerting
  19. 19 Dynamic scanning
  20. 20 Scanning as a method of discovering vulnerabilities
  21. 21 Challenges
  22. 22 Security Policies
  23. 23 Security Visibility
  24. 24 Breaking Down Silos
  25. 25 HTTP 500 Errors
  26. 26 Bringing Data Together
  27. 27 Vintage Meme
  28. 28 Annual Pen Tests
  29. 29 Pen Tests and Bug bounties
  30. 30 Conclusion
  31. 31 Attack Driven
  32. 32 Modern Feedback Visibility
  33. 33 Continuous Testing
  34. 34 Happy Note
  35. 35 Security Reports

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.