Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Creating an Application Security Program from the Ground Up
Training Overview
Description of Training
Video Overview (1:01)
Welcome to the course!
Introduction (1:01)
Why do we need application security
Define Application Security (8:53)
Why is application security challenging (8:22)
Shifting Left vs Shifting Right (11:10)
Application Security Needs You (6:56)
Defining the problem
Integrity (5:28)
Confidentiality (10:53)
Availability (7:34)
Authentication and Authorization (4:27)
Adversaries (5:33)
Measuring Risk (9:41)
Components of application security
Security Analysis (11:17)
Threat Modeling (15:12)
Penetration Testing (3:21)
Run-Time Protection (8:09)
Vulnerability Management (10:10)
Putting It all Together (5:58)
Releasing Secure Code
How Software Gets Developed (12:39)
Security in DevOps (4:34)
Applying Security Tools (17:07)
Security belongs to everyone
Security is everyone's problem (5:36)
Creating Security Education (8:02)
Security Standards, requirements, and reference architecture (7:10)
Security Maturity Models (10:09)
Decentralized application security (6:10)
Application security as a service
Enablement instead of gates (4:31)
Managing Risk in Development (5:45)
Bridging engineering and security (5:41)
Building a roadmap
Organizational goals (3:53)
Getting the current posture (9:17)
Identifying gaps (5:07)
Application security roadmaps (3:10)
Measuring success in your application security program
Key Performance Indicators (5:40)
Measuring Effectiveness (8:02)
Getting feedback on the program (3:58)
Security Scorecards (5:23)
Continuously improving the program
Staying ahead of the attackers (6:23)
Threat Catalogs (8:51)
Staying ahead of engineering (6:52)
Shine Tools (3:58)
Audio Version of the Training
Audio Download
Applying Security Tools
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock