Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.

Well done!

You have completed (UPI) Chapter 12: Threat Detection and Defense Techniques!

Instruction

12.3.2 SAST, DAST, and IAST Tools Selection

SAST and IAST tools are selected based on the Java 2 Platform, Enterprise Edition (J2EE), as Java is one of the most used technologies in web application development and one of the most secure. The selected tools include: Two SAST Tools: Fortify SCA (SAST commercial tool by Microfocus): Detects more than 479 vulnerabilities and supports 18 distinct languages. FindSecurityBugs (SAST OWAS...