Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
Well done!
You have completed (UPI) Chapter 12: Threat Detection and Defense Techniques!
You have completed (UPI) Chapter 12: Threat Detection and Defense Techniques!
Instruction
12.3.2 SAST, DAST, and IAST Tools Selection
SAST and IAST tools are selected based on the Java 2 Platform, Enterprise Edition (J2EE), as Java is one of the most used technologies in web application development and one of the most secure. The selected tools include:
Two SAST Tools:
Fortify SCA (SAST commercial tool by Microfocus): Detects more than 479 vulnerabilities and supports 18 distinct languages.
FindSecurityBugs (SAST OWAS...