Introduction to security development process

Introduction to security development process

This module introduces development security practices describing SQL injection attacks, threat modeling, and security for continuous integration. You will learn the key validation points and how to secure your pipeline.

Administrator
Developer
DevOps Engineer
Security Engineer
Security Operations Analyst
Service Adoption Specialist
Solution Architect
Technology Manager
Azure
GitHub
Artifacts
Boards
Cloud Services
Azure DevOps
Pipelines
Repos
Test Plans

Module Objectives

By the end of this module, you'll be able to:

  • Identify SQL injection attack
  • Understand threat modeling
  • Describe key validation points
  • Apply security for continuous integration

Prerequisites

None