How to Conduct a Product Security Test and How it Fits Into the Larger Security Strategy

How to Conduct a Product Security Test and How it Fits Into the Larger Security Strategy

via YouTube Direct link

Burp Suite

32 of 38

32 of 38

Burp Suite

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

How to Conduct a Product Security Test and How it Fits Into the Larger Security Strategy

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 We are here to help
  3. 3 Product complexity
  4. 4 Background Knowledge
  5. 5 Security Concerns
  6. 6 Continuous Improvement Models
  7. 7 Wasps
  8. 8 Why do coding mistakes happen
  9. 9 Not every device is built with security
  10. 10 Use strong passwords
  11. 11 Software updates
  12. 12 Protecting intellectual property
  13. 13 Security researchers
  14. 14 How we conduct security product security reviews
  15. 15 Initial system investigation
  16. 16 Additional domain knowledge
  17. 17 Product analysis
  18. 18 WASP Top 10
  19. 19 Dot Peek
  20. 20 Decompile
  21. 21 Static Analysis
  22. 22 Static Analysis Tools
  23. 23 Gartner Magic Quadrant
  24. 24 Vulnerability Composition Analysis
  25. 25 Vulnerability Composition Analysis Output
  26. 26 Static Analysis Tool
  27. 27 Visual Studio
  28. 28 Dynamic Analysis
  29. 29 Web Interface
  30. 30 Fuzz Testing
  31. 31 Manual Hacking
  32. 32 Burp Suite
  33. 33 Code Review
  34. 34 Proof of Concept
  35. 35 Command Injection
  36. 36 Keep it Ethical
  37. 37 Reporting
  38. 38 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.