Course description
On completion of this course, participants should be able to:
- Use Fortify SCA/SSC to correlate, view, and respond to security incidents leveraging Fortify technologies to solve security problems in your applications based on defined topics
- Successfully complete the lessons below in an environment that acts as a production environment.