Skip to content

FÜR EINZELPERSONEN

open
Logo

FÜR EINZELPERSONEN

open
Logo
FACHBEREICH
open
Logo
UNTERFACHBEREICH
open
Logo
UNTERFACHBEREICH
open
Logo
SEMINARE
open
Basic
Advanced
Expert
Sonstige Seminare

SEMINAR

NV-5430
Micro Focus
Background
4 Tage
Background
Standorte
Background
Termine

Fortify-SCA and SSC

Kein Badge verfügbar.

Ihren Wunschtermin finden
Background
Praxisnahe Seminare, die Ihren Berufsalltag spürbar erleichtern
Background
SEMINARINHALTE

Das erwartet Sie

Ziele
open
Upon successful completion of this course, you should be able to: Scan applications thoroughly and correctly using Fortify Audit Fortify scan results to create a prioritized list of high-impact security findings Correctly and efficiently validate security findings Build a custom Data Flow Cleanse rule Integrate and manage projects through the SSC to ensure good processes
Inhalt
open

Module 1: Fortify Architecture and Application Security Overview

  • Identify the Fortify architectural structure and workflow
  • Recognize the importance of application security in your Software Development Life Cycle (SDLC)


Module 2: Fortify SSC Setup

  • Recognize the Application version and Administration options
  • Create an application version and update SSC Rulepacks
  • Integrate Audit Workbench scan results with SSC application versions


Module 3: Fortify SCA Analyzers Metrics

  • Describe the automated scanning process
  • Explain the function of each Analyzer
  • Recognize how the findings are placed within each risk folder


Module 4: Fortify Static Scanning

  • Define the features and usage of Fortify’s scanning options
  • Recognize the different IDE plugins that integrate with Fortify SCA Analysis
  • Successfully run Fortify scans in several ways, using:
  • Audit Workbench
  • Scan Wizard
  • Command Line
  • Eclipse
  • Visual Studio


Module 5: Auditing Fortify Scan Results

  • Verify your scan results in Audit Workbench
  • Identify the findings in the Critical folder
  • Utilize Smart View for a visual representation of the dataflow issues in your code
  • Recognize findings categories in the Critical folder
  • Apply the appropriate validation method to remediate a given vulnerability
  • Filter, Audit, and suppress issues to reduce noise
  • Find information, i.e. Details and Recommendations, to fix security issues


Module 6: Data Validation

  • Securely implement data validation
  • Select the right data validation for a particular situation
  • Extend data validation libraries


Module 7: Analysis Trace and Remediating Vulnerabilities

  • Properly read the analysis trace
  • Audit vulnerabilities for:
  • SQL Injection
  • XSS
  • Log Forging
  • Cross-Site Request Forgery (CSRF)


Module 8: Custom Rules

  • Recognize how to use data flow cleanse rules to integrate data validation into Fortify
  • Create a data validation rule


Module 9: Utilize Fortify SSC (Software Security Center), Audit and Report

  • Effectively navigate the Fortify SSC (Software Security Center)
  • Review scan results upload and audit issues using SSC capabilities
  • Generate reports to show outstanding issues, progress on security goals and a summary of the vulnerabilities detected during a scan


Module 10: Bug Tracking Integration

  • Utilize Bug tracking tool through the SSC and AWB


Module 11: Utilize Audit Assistant in SSC

  • Recognize the value for utilizing Audit Assistant
  • Define the Fortify Scan Analytics tenant Prediction Policies
  • Configure your SSC to utilize Audit Assistant
  • Submit training data, issues, and review the AA results
Badge
open

Kein Badge verfügbar.

Vorkenntnisse
open
To be successful in this course, you should have the following prerequisites or knowledge: Basic programming skills (able to read Java, C/C++, or .NET) Basic understanding of web technologies: HTTP Requests and Responses, HTML tags, JavaScript, and server-side dynamic content (JSP, ASP or similar) Knowledge of Web and Application development practices Experience developing and/or managing software development for security Have an understanding of your organization’s compliance requirements
Zielgruppe
open
This course is intended for application developers or security auditors who are new to or have been using the Fortify SCA and SSC to develop secure applications. It is also useful for development managers and application security champions.
Methoden
open
Mann mit Laptop
Seien Sie nicht nur am Ergebnis orientiert. Sondern auch am Erlebnis.
Manager Institut Swoosh
Unsere Bestsellerseminare
Manager University Logo
Werdet die agilen Managerinnen und Manager von morgen.
Ziel: Zertifizierter Abschluss, um sich klar am Markt vor den anderen positionieren zu können; nutzen Sie Ihre Aufstiegschance für Weiterführung Ihrer Karriere. Persönliche und fachspezifische Persönlichkeitsentwicklung.

ZUR MANAGER INSTITUT UNIVERSITY

open
Kontakt
TELEFON
+49 800 3060303
FAX
+49 800 3060303 33
MAIL
beratung@manager-institut.de

MARTIN HEUBECK

Sales Gruppenseminare und Inhouse Standard
Mo - Fr 8:00 - 17:00 Uhr
Martin.Heubeck@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

ITALIA BRILLANTE

Group Leader Inhouse und Seminarmanagement
Mo - Fr 8:00 - 17:00 Uhr
Italia.Brillante@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

TUGBA PAMUKCUOGLU

Seminarmanager
Mo - Fr 8:00 - 17:00 Uhr
Tugba.Pamukcuoglu@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

JESSICA GERSTENLAUER

Junior Seminarmanager
Mo - Fr 8:00 - 17:00 Uhr
Jessica.Gerstenlauer@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

FAYZULLAKHON UMAROV

Seminar and Finance Coordinator
Mo - Fr 8:00 - 17:00 Uhr
Fayzullakhon.Umarov@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

SIMONE HABERGER-ZAHN

Finance Manager
Mo - Fr 8:00 - 17:00 Uhr
Buchhaltung@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

ANNA HENNING

Marketing Manager
Mo - Fr 8:00 - 17:00 Uhr
Anna.Henning@
www.manager-institut.de

BERATUNGSTERMIN BUCHEN

open
MEINUNGEN