课程简介
This training focus on why and how software testing is an integral part of the software development process. Develop practical knowledge of fundamental software testing tools and practice the techniques needed to improve processes, write test cases, conduct manual and automated tests, create bug reports, and defend your bug to management. Learn software testing axioms, testing types, test environments, testing methodologies, and risk-based testing. Apply these newly found skills to a real-world project and experience the results.
目标收益
Participants will leave this course with a knowledge of the testing discipline and apply them to real-world projects. Specifically:
• Define what testing is, and what it isn’t
• Describe how testing fits into the different software development lifecycles used in the industry today including Agile
培训对象
课程大纲
• Testing Overview |
• What it is, what it is not, roles, responsibilities • Risk-based testing • What is a bug, what is the bug lifecycle • Test documentation including test plan and test cases • Types of test |
• Software Testing in Agile and Scrum |
• Software development lifecycle • Agile and Scrum Methodologies of Product Development • Test Driven Development (TDD) • Estimating in Agile • 4 Quadrants of Agile Testing • Scrum Lifecycle • Customer Scenarios, User Stories, and Use Cases • Estimations |
• Software Quality Assurance in Action |
• Functional Testing • Structural Testing • Data-driven Quality • Security Testing • Website Testing • Testing in Production, DevOps |
• Applied Testing in the Real World | • Applied Testing in the Real World |
Security section |
1 Terms and definitions used in this module 2 What is security testing? 3 Access control – Authentication and Authorization 3.1File Access Example 4 File fuzzing 4.1 File fuzzing examples (two) 4.2 File fuzzing tools 5 What is Internet Security? 6 Internet Security Example – Cookies 7 Authentication 8 Testing access control 9 Security testing examples 9.1 Buffer Overrun 9.2 Denial of Service 9.3 Proper error handing 9.4 SQL Injection 9.4.1SQL Injection Example 9.4.2Tools to test SQL Injection 9.5 Cross-site scripting 9.6 Hidden field tampering 9.7 Elevation of privileges 10 Threat Modeling 10.1 STRIDE and DREAD models 10.2 Rating threats 10.3 Threat model example 11 Other security testing tools 12 How to learn more on your own |
• Testing Overview • What it is, what it is not, roles, responsibilities • Risk-based testing • What is a bug, what is the bug lifecycle • Test documentation including test plan and test cases • Types of test |
• Software Testing in Agile and Scrum • Software development lifecycle • Agile and Scrum Methodologies of Product Development • Test Driven Development (TDD) • Estimating in Agile • 4 Quadrants of Agile Testing • Scrum Lifecycle • Customer Scenarios, User Stories, and Use Cases • Estimations |
• Software Quality Assurance in Action • Functional Testing • Structural Testing • Data-driven Quality • Security Testing • Website Testing • Testing in Production, DevOps |
• Applied Testing in the Real World • Applied Testing in the Real World |
Security section 1 Terms and definitions used in this module 2 What is security testing? 3 Access control – Authentication and Authorization 3.1File Access Example 4 File fuzzing 4.1 File fuzzing examples (two) 4.2 File fuzzing tools 5 What is Internet Security? 6 Internet Security Example – Cookies 7 Authentication 8 Testing access control 9 Security testing examples 9.1 Buffer Overrun 9.2 Denial of Service 9.3 Proper error handing 9.4 SQL Injection 9.4.1SQL Injection Example 9.4.2Tools to test SQL Injection 9.5 Cross-site scripting 9.6 Hidden field tampering 9.7 Elevation of privileges 10 Threat Modeling 10.1 STRIDE and DREAD models 10.2 Rating threats 10.3 Threat model example 11 Other security testing tools 12 How to learn more on your own |