{"id":729,"date":"2020-09-10T15:20:02","date_gmt":"2020-11-05T15:38:52","guid":{"rendered":"https:\/\/staging.ict-improve.nl\/?post_type=training&#038;p=729"},"modified":"2025-09-13T18:09:14","modified_gmt":"2025-09-13T16:09:14","slug":"istqb-advanced-security-tester","status":"publish","type":"training","link":"https:\/\/staging.ict-improve.nl\/en\/training\/istqb-advanced-security-tester\/","title":{"rendered":"ISTQB\u00ae Specialist Security Tester (CTAL-SEC) EN"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"729\" class=\"elementor elementor-729\" data-elementor-post-type=\"training\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2a9254ab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2a9254ab\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-64dbc48f\" data-id=\"64dbc48f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-11fbef42 elementor-widget elementor-widget-text-editor\" data-id=\"11fbef42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p class=\"MsoNormal\"><b><span lang=\"EN-US\">Become certified\nSecurity Tester<o:p><\/o:p><\/span><\/b><\/p><p>\n\n<\/p><p style=\"text-align:justify\"><span lang=\"EN-US\" style=\"font-size:11.0pt;\nfont-family:&quot;Calibri&quot;,sans-serif;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:\nminor-latin;mso-bidi-theme-font:minor-latin;mso-ansi-language:EN-US\">With the\nprevalence of cyber security breaches, it is clear that more testing is needed\nto be sure that security defenses are in place and working effectively. You\nwill gain detailed knowledge of security risks, vulnerabilities and defenses in\norder to create and perform tests that validate the effectiveness of existing\nand new security defenses in a given context.<o:p><\/o:p><\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Become certified Security Tester With the prevalence of cyber security breaches, it is clear that more testing is needed to be sure that security defenses are in place and working effectively. You will gain detailed knowledge of security risks, vulnerabilities and defenses in order to create and perform tests that validate the effectiveness of existing [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":0,"menu_order":99991231,"template":"","meta":{"_acf_changed":true,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"class_list":["post-729","training","type-training","status-publish","hentry"],"acf":{"goals":"After this training, you will:\r\n<ul>\r\n \t<li>Plan, perform and evaluate security tests from different angles<\/li>\r\n \t<li>Analyze any situation and choose the best security testing methods for it<\/li>\r\n \t<li>Assess the performance of security mechanisms, such as firewalls and encryption<\/li>\r\n \t<li>Understand how attackers think and how to counter their strategies<\/li>\r\n \t<li>Manage the human factors in Information Security<\/li>\r\n \t<li>Identify and document the security test requirements and tools<\/li>\r\n<\/ul>","description":"<strong>An international standard in software testing<\/strong>\r\n\r\nThe International Software Testing Qualification Board (ISTQB) was established in November 2002 with the aim of creating and harmonizing a global certification program for software testing. Today, the ISTQB certification scheme is fully recognized and widely adopted around the world.\r\n\r\nThis four-day accredited course prepares you for the exam <strong>ISTQB Specialist Security Tester<\/strong> and meets the requirements set by ISTQB.","target_audience":"<strong>Who should attend this training?<\/strong>\r\n\r\nThe training is aimed at people who already have achieved an advanced point in their careers in software testing and wish to develop their expertise in security testing.\r\n\r\n<strong>Roles of participants in their organization<\/strong>\r\n\r\nThis training is meant for:\r\n<ul>\r\n \t<li>Security Testers<\/li>\r\n \t<li>Software Testers who wish to develop a specialty in security testing<\/li>\r\n \t<li>Security Administrators who wish to learn how to test new and existing defenses<\/li>\r\n \t<li>Developers who want to learn secure coding techniques<\/li>\r\n \t<li>Managers who want to learn how security testing fits in the project lifecycle<\/li>\r\n<\/ul>\r\n<strong>Prior knowledge or training<\/strong>\r\n\r\nYou possess the ISTQB Foundation Certificate in Software Testing and have 3+ years of software testing and related experience.","program":"<strong>Structure of this training<\/strong>\r\n\r\nThe training lasts four days in which you will learn all about security testing. In the Virtual Classroom these will be four days of 5 hour online meetings.\r\n\r\nThe exam consists of 45 multiple-choice questions and will take place on an extra day after the course. With a score of 65% or higher you get the ISTQB Security Tester Certificate.\r\n\r\n<strong>Course outline<\/strong>\r\n\r\n<em>The Basis of Security Testing<\/em>\r\n<ul>\r\n \t<li>Security Risks<\/li>\r\n \t<li>Information Security Policies<\/li>\r\n \t<li>Security Auditing<\/li>\r\n<\/ul>\r\n<em>Security Testing Purposes, Goals and Strategies<\/em>\r\n<ul>\r\n \t<li>Security Testing\r\n<ul>\r\n \t<li>Purpose<\/li>\r\n \t<li>Objectives<\/li>\r\n \t<li>Scope and Coverage<\/li>\r\n \t<li>Approaches<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li>Improving the Security Testing Practices<\/li>\r\n<\/ul>\r\n<em>Security Testing Processes<\/em>\r\n<ul>\r\n \t<li>Security Test Process Definition<\/li>\r\n \t<li>Security Test Maintenance<\/li>\r\n<\/ul>\r\n<em>Security Testing Throughout the Software Lifecycle<\/em>\r\n<ul>\r\n \t<li>Role of Security Testing in a Software Lifecycle<\/li>\r\n<\/ul>\r\n<em>Testing Security Mechanisms<\/em>\r\n<ul>\r\n \t<li>System Hardening<\/li>\r\n \t<li>Authentication and Authorization<\/li>\r\n \t<li>Encryption<\/li>\r\n \t<li>Firewalls and Network Zones<\/li>\r\n \t<li>Intrusion Detection<\/li>\r\n \t<li>Malware Scanning<\/li>\r\n \t<li>Data Obfuscation<\/li>\r\n \t<li>Training<\/li>\r\n<\/ul>\r\n<em>Human Factors in Security Testing<\/em>\r\n<ul>\r\n \t<li>Understanding the Attackers<\/li>\r\n \t<li>Social Engineering<\/li>\r\n<\/ul>\r\n<em>Security Test Evaluation and Reporting<\/em>\r\n\r\n<em>Security Testing Tools<\/em>\r\n<ul>\r\n \t<li>Types and Purposes<\/li>\r\n \t<li>Tool Selection<\/li>\r\n<\/ul>\r\n<em>Standards and Industry Trends<\/em>\r\n<ul>\r\n \t<li>Understanding and Applying Security Testing Standards<\/li>\r\n \t<li>Industry Trends<\/li>\r\n<\/ul>\r\n<strong>Possibilities in-house training<\/strong>\r\n\r\nICT Improve provides this training in-house and tailored to your specific situation and needs upon request. For more information, please contact us at +31 (0)40 - 202 1803 or <a href=\"mailto:opleidingen@ict-improve.nl\">training@ict-improve.nl<\/a>.","practical":"<strong>Training information Virtual Classroom<\/strong>\r\n<ul>\r\n \t<li>Location and dates: check the\u00a0<a href=\"https:\/\/staging.ict-improve.nl\/trainingen\/\">training calendar<\/a><\/li>\r\n \t<li>Schedule: 14:00 - 19:00 (four days)<\/li>\r\n \t<li>Training material included in the training fee<\/li>\r\n \t<li>Three months free e-coaching<\/li>\r\n<\/ul>\r\nFor more information, please contact us at +31 (0)40 - 202 1803 or <a href=\"mailto:opleidingen@ict-improve.nl\">training@ict-improve.nl<\/a>\r\n\r\nICT Improve also offers bespoke in-house training tailored to your specific requirements and needs upon request.","teacher":"<strong>Your trainer from the USA<\/strong>\r\n\r\nRandall (Randy) W. Rice is a thought-leading author, speaker and consultant in the field of software testing and software quality.\r\n\r\nRandy has over 40 years experience building and testing mission-critical projects in a variety of environments. He has worked in the roles of software developer, system designer, project manager, QA manager, test manager, management consultant and trainer.\r\n\r\nRandy was the chair of the ISTQB's Working Party for the current Advanced Security Tester Syllabus and he is an officer of the American Software Testing Qualifications Board (ASTQB).","session":"no","opleidingscode":"39571b20-8e70-4eb9-a247-83b7efe6519a"},"_links":{"self":[{"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/training"}],"about":[{"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/types\/training"}],"version-history":[{"count":0,"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/729\/revisions"}],"wp:attachment":[{"href":"https:\/\/staging.ict-improve.nl\/en\/wp-json\/wp\/v2\/media?parent=729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}