Time
5 hours 54 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Description

This lesson focuses on non-functional testing which includes the following types: • Performance • Load • Stress • Scalability • Environment • Interoperability • Disaster Recovery • Simulation Sometimes, after or in addition to the above mentioned testing method; there are other methods used which are privacy and user acceptance testing (UAT).

Video Transcription

00:04
All right. Now, we've looked at functional testing Where we look at whether or not the software performs. Is it supposed to? Now we're gonna look at non functional testing, checking things like its performance isn't going to meet the objectives of the business from a performance standpoint. Where is the software gonna be a bottleneck?
00:24
Will the software satisfy the requirements that we've committed to in the service level agreement? Hey, that's performance testing. Then we can also do load testing and stress testing these to go very closely together. So with low testing, what we're trying to figure out is, how much can the software handle?
00:44
How many connections? How much Processing Hammond users. How many tasks
00:49
can the system handle gracefully?
00:52
Stress testing We're looking at Okay, what happens if we exceed those points? How does the software failed? Does it fail securely? Does it fail in a manner where no further breach could be compromised? Ah, can the software recover gracefully that comes under stress testing.
01:08
So with low testing were kind of looking to see what it can handle
01:12
with stress testing. We want to see what happens if we exceed those limits. We've learned in load testing. So a lot of times, the two go hand in hand.
01:22
Ah, scalability testing. Is this a software environment that can grow or is it very limited to our existing structure? And of course, we always want to be very forward thinking we always want to design. That's gonna allow our organization to grow and get past. You know, the early on limitations of the business.
01:40
We'll test the environment. We want verification that the security of the environment in which we're gonna install the software
01:48
is going to support the installation of the software, that it's a secure environment, that it's gonna be implemented. Well,
01:56
interoperability testing again. You know, this application isn't gonna exist in a vacuum. It's going onto a network with lots of other systems and lots of other functions, and other applications and processes are all in place. What we want to find out is, will our application sit in
02:14
or is it gonna cause trouble with other systems?
02:16
We wanted to sit right in. We want to be interoperable, and one of the main ways to allow interoperability is by following the standards. You know, if we try to be very proprietary. In our nature, we tend to miss out on following the standards that allow us to fit into most in the environment
02:36
disaster recovery testing. So here what we're talking about is with the application in the event of the failure, are we going to be able to recover? The application ended Stata,
02:50
based on the criticality determined within our organization. So essentially, what that comes down to is can we restore what we need to restore quick enough to be about you?
03:00
So when we talk about disaster recovery, we talk about ideas like maximum tolerable downtime, which the very longest Aiken be without this component before my company suffers a loss. Well, when we talk about disaster recovery testing, can I restore within that maximum tolerable downtime?
03:20
Or is this software that's gonna take
03:23
ages and ages and ages to restore? Because I may not be able to meet those requirements? Also, if it's a database application, how quickly can I recover? The process is how many processes would be lost in the disaster based environment.
03:38
Do I have the appropriate control so that I can restore data appropriately? All that's got to be checked,
03:46
all right, then simulation testing.
03:47
It's great to do all these tests in the lab, and we absolutely have to do it. But ultimately, um, the real test is how it works out in production. Well, we can't afford to send the non tested a non verified system into production. So the key is really making sure that my lab environment
04:08
minutes mimics production
04:10
as much as possible. That's not always easy because we have so many different elements out in production. But a sure sign that I don't have a good match is when we have software that performs very well in production. I'm sorry in labs, and then it gets to production and it fails. Well, obviously there's gonna be some sort of variation between our lab environment
04:30
and the production environment.
04:31
Our goal is always gonna be to get those two as close as possible.
04:38
Different types of testing, other testing. We may test for privacy, making sure that the sensitive information is protected appropriately. We've mentioned that already user acceptance testing. We've talked about already letting our end users get the product in their hand, making sure the application will meet their needs.
04:56
Remember, these are the folks that are gonna be using the software anyway.
05:00
We want to make sure that we get their feet back.
05:03
All other testing will be completed before we turn it over to the user. So we've gone through our unit testing. We've integrated with done regression testing. Really? This is one of the final things that we do before turning over this product to production is we do our user acceptance testing. Um, often,
05:23
we want to make sure that this is close as close to real world scenario usage is possible
05:29
because we want our users to have confidence and we want to have confidence in the product that we're producing.
05:35
In just a moment, we'll take the final step and talk about security test.

Up Next

ISC2 Certified Secure Software Life-cycle Professional (CSSLP)

This course helps professionals in the industry build their credentials to advance within their organization, allowing them to learn valuable managerial skills as well as how to apply the best practices to keep organizations systems running well.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor