{"id":2701,"date":"2025-04-08T14:08:45","date_gmt":"2025-04-08T14:08:45","guid":{"rendered":"https:\/\/www.AnwarBosbool.com\/ar\/?p=2701"},"modified":"2025-04-08T14:08:45","modified_gmt":"2025-04-08T14:08:45","slug":"security-essentials-for-quality-engineers","status":"publish","type":"post","link":"https:\/\/www.AnwarBosbool.com\/ar\/2025\/04\/security-essentials-for-quality-engineers\/","title":{"rendered":"5 \u0623\u0633\u0627\u0633\u064a\u0627\u062a \u0623\u0645\u0646\u064a\u0629 \u0631\u0626\u064a\u0633\u064a\u0629 \u0644\u0645\u0647\u0646\u062f\u0633\u064a \u0627\u0644\u062c\u0648\u062f\u0629 (Security Essentials)"},"content":{"rendered":"<p style=\"padding-left: 30px;\">\u0641\u064a \u0647\u0630\u0627 \u0627\u0644\u0645\u0648\u0636\u0648\u0639 \u0627\u0633\u062a\u0639\u0631\u0627\u0636 \u0644\u0644\u062a\u063a\u064a\u0651\u0631\u00a0\u0627\u0644\u062d\u0627\u0635\u0644 \u0641\u064a \u062f\u0648\u0631 \u0645\u0647\u0646\u062f\u0633\u064a \u0627\u0644\u062c\u0648\u062f\u0629 \u0623\u062b\u0646\u0627\u0621 \u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631\u0627\u062a \u0648\u0630\u0644\u0643 \u0641\u064a \u0623\u062f\u0627\u0621 \u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631\u0627\u062a \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0627\u0644\u0623\u0645\u0627\u0646. \u0623\u064a\u0636\u064b\u0627 \u0646\u062a\u0639\u0631\u0651\u0641 \u0639\u0644\u0649 \u062e\u0645\u0633\u0629 \u0623\u0633\u0627\u0633\u064a\u0627\u062a \u0623\u0645\u0646\u064a\u0629 \u0631\u0626\u064a\u0633\u064a\u0629 \u0644\u0645\u0647\u0646\u062f\u0633\u064a \u0627\u0644\u062c\u0648\u062f\u0629.<!--more--><\/p>\n<p>\u0641\u064a \u0627\u0644\u0628\u062f\u0627\u064a\u0629\u060c \u062f\u0639\u0648\u0646\u0627 \u0646\u062a\u0651\u0641\u0642 \u0639\u0644\u0649 \u0623\u0646 \u0645\u0635\u0637\u0644\u062d\u00a0<strong>\u0645\u0647\u0646\u062f\u0633 \u0627\u0644\u062c\u0648\u062f\u0629 (Quality Engineer)<\/strong>\u00a0\u0644\u0627 \u064a\u0642\u062a\u0635\u0631 \u0641\u0642\u0637 \u0639\u0644\u0649 \u0645\u062e\u062a\u0628\u0631\u064a \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0648\u0645\u0647\u0646\u062f\u0633\u064a \u0636\u0645\u0627\u0646 \u0627\u0644\u062c\u0648\u062f\u0629 (QA Engineers) \u0641\u062d\u0633\u0628\u060c \u0648\u0644\u0643\u0646 \u064a\u0634\u0645\u0644 \u0623\u0639\u0636\u0627\u0621 \u0641\u0631\u064a\u0642 \u0639\u0645\u0644 \u0627\u0644\u0645\u0634\u0631\u0648\u0639 \u0645\u062b\u0644: \u0627\u0644\u0645\u0637\u0648\u0651\u0631\u0648\u0646 (Developers) \u0648 DevOps Engineers \u0648 Architecture Engineers.<\/p>\n<p>\u0644\u0642\u062f \u062a\u063a\u064a\u0651\u0631 \u062f\u0648\u0631 \u0645\u0647\u0646\u062f\u0633\u064a \u0627\u0644\u062c\u0648\u062f\u0629 \u0644\u064a\u0634\u0645\u0644 \u0623\u062f\u0627\u0621 \u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631\u0627\u062a \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629 \u0627\u0644\u0645\u062a\u0639\u0644\u0651\u0642\u0629 \u0628\u0627\u0644\u0623\u0645\u0627\u0646 (security) \u0628\u062f\u0644\u064b\u0627 \u0645\u0646 \u0627\u0644\u0627\u0643\u062a\u0641\u0627\u0621 \u0628\u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631\u0627\u062a \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0648\u0638\u0627\u0626\u0641 \u0627\u0644\u062a\u0637\u0628\u064a\u0642 (functionalities) \u0648\u0642\u0627\u0628\u0644\u064a\u0629 \u0627\u0644\u0627\u0633\u062a\u062e\u062f\u0627\u0645 (usability) \u0648\u0627\u0644\u0623\u062f\u0627\u0621 (performance). \u0643\u0627\u0646 \u0645\u0647\u0646\u062f\u0633\u0648 \u0627\u0644\u062c\u0648\u062f\u0629 \u064a\u0642\u0648\u0645\u0648\u0646 \u0641\u0642\u0637 \u0628\u0627\u0644\u062a\u0623\u0643\u062f \u0645\u0646 \u0623\u0646 \u0627\u0644\u062a\u0637\u0628\u064a\u0642 \u064a\u0639\u0645\u0644 \u0643\u0645\u0627 \u0647\u0648 \u0645\u062a\u0648\u0642\u0651\u0639 \u0628\u064a\u0646\u0645\u0627 \u0643\u0627\u0646 \u0627\u0644\u0623\u0645\u0627\u0646 \u0647\u0648 \u0645\u0633\u0624\u0648\u0644\u064a\u0629 \u0641\u0631\u064a\u0642 \u0627\u0644\u0623\u0645\u0646 (security team). \u0623\u0645\u0627 \u0627\u0644\u0622\u0646\u060c \u0623\u0635\u0628\u062d \u0627\u0644\u0623\u0645\u0627\u0646 \u0645\u0633\u0624\u0648\u0644\u064a\u0629 \u0645\u0634\u062a\u0631\u0643\u0629 \u0628\u064a\u0646 \u0623\u0639\u0636\u0627\u0621 \u0627\u0644\u0641\u0631\u064a\u0642 \u0648\u064a\u062c\u0628 \u0639\u0644\u0649 \u0645\u0647\u0646\u062f\u0633\u064a \u0627\u0644\u062c\u0648\u062f\u0629 \u0623\u0646 \u064a\u0641\u0643\u0651\u0631\u0648\u0627 \u0645\u062b\u0644 \u0627\u0644\u0647\u0627\u0643\u0631\u0632 (hackers). \u064a\u062a\u0639\u064a\u0651\u0646 \u0639\u0644\u0649 \u0645\u0647\u0646\u062f\u0633\u064a \u0627\u0644\u062c\u0648\u062f\u0629 \u0627\u062e\u062a\u0628\u0627\u0631 \u0648\u0638\u0627\u0626\u0641 \u0627\u0644\u062a\u0637\u0628\u064a\u0642 \u0648\u0643\u0630\u0644\u0643 \u0627\u0644\u0642\u062f\u0631\u0629 \u0639\u0644\u0649 \u0627\u0644\u0635\u0645\u0648\u062f \u0636\u062f \u0627\u0644\u0647\u062c\u0645\u0627\u062a. \u0625\u0630\u0627 \u0644\u0645 \u0646\u0642\u0645 \u0628\u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0623\u0645\u0627\u0646 \u0628\u0634\u0643\u0644 \u0627\u0633\u062a\u0628\u0627\u0642\u064a\u060c \u0641\u0625\u0646\u0646\u0627 \u0646\u062a\u0631\u0643 \u0627\u0644\u0623\u0628\u0648\u0627\u0628 \u0645\u0641\u062a\u0648\u062d\u0629 \u0639\u0644\u0649 \u0645\u0635\u0631\u0627\u0639\u064a\u0647\u0627.<\/p>\n<p>\u062f\u0639\u0648\u0646\u0627 \u0627\u0644\u0622\u0646 \u0646\u0646\u062a\u0642\u0644 \u0644\u0644\u062d\u062f\u064a\u062b \u0639\u0646\u00a0\u062e\u0645\u0633\u0629\u00a0\u0623\u0633\u0627\u0633\u064a\u0627\u062a \u0623\u0645\u0646\u064a\u0629\u00a0\u0631\u0626\u064a\u0633\u064a\u0629 \u0644\u0645\u0647\u0646\u062f\u0633\u064a \u0627\u0644\u062c\u0648\u062f\u0629.<\/p>\n<p><b>\u0623\u0648\u0644\u064b\u0627:\u00a0\u0625\u062a\u0642\u0627\u0646 \u0639\u0642\u0644\u064a\u0651\u0629 \u0627\u0644\u0647\u0627\u0643\u0631<\/b><\/p>\n<p>\u064a\u062c\u0628 \u0623\u0646 \u064a\u0642\u0648\u0645 \u0645\u0647\u0646\u062f\u0633\u0648 \u0627\u0644\u062c\u0648\u062f\u0629 \u0628\u062a\u0646\u0641\u064a\u0630 \u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631\u0627\u062a \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0627\u0644\u0623\u0645\u0627\u0646 \u0628\u0630\u0643\u0627\u0621 \u0645\u0646\u00a0\u062e\u0644\u0627\u0644 \u0627\u0644\u062a\u0641\u0643\u064a\u0631 \u0645\u062b\u0644 \u0627\u0644\u0645\u0647\u0627\u062c\u0645 (attacker). \u062a\u0648\u0636\u062d \u0627\u0644\u0646\u0642\u0627\u0637 \u0627\u0644\u062a\u0627\u0644\u064a\u0629 \u0643\u064a\u0641\u064a\u0629 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u00a0\u0627\u0644\u0647\u0627\u0643\u0631\u0632 \u0644\u0644\u0623\u0646\u0638\u0645\u0629:<\/p>\n<ul>\n<li>\u062b\u063a\u0631\u0627\u062a \u0648\u0627\u062c\u0647\u0629 \u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a (API Vulnerabilities): \u0645\u062b\u0644 unprotected endpoints\u00a0\u0648 broken authentication.<\/li>\n<li>SQL Injection &amp; XSS:\u00a0\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u062d\u0642\u0648\u0644 \u0627\u0644\u0625\u062f\u062e\u0627\u0644 (exploiting input fields).<\/li>\n<li>\u062a\u062e\u0632\u064a\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u063a\u064a\u0631 \u0627\u0644\u0622\u0645\u0646:\u00a0\u0643\u0634\u0641 \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0639\u062a\u0645\u0627\u062f \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 (exposing user credentials).<\/li>\n<\/ul>\n<p><strong>\u062b\u0627\u0646\u064a\u064b\u0627:\u00a0\u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0623\u0645\u0627\u0646 \u0628\u0645\u0627 \u064a\u062a\u062c\u0627\u0648\u0632 \u0627\u062e\u062a\u0628\u0627\u0631\u0627\u062a \u0627\u0644\u0627\u062e\u062a\u0631\u0627\u0642 \u0648\u0627\u0644\u062a\u0637\u0628\u064a\u0642<\/strong><\/p>\n<p>\u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0623\u0645\u0627\u0646 \u0644\u064a\u0633 \u062d\u0643\u0631\u064b\u0627 \u0639\u0644\u0649 \u0645\u062e\u062a\u0628\u0631\u064a \u0627\u0644\u0627\u062e\u062a\u0631\u0627\u0642\/\u0623\u0645\u0646 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a\u060c \u0628\u0644 \u0647\u0648 \u0644\u0644\u062c\u0645\u064a\u0639.<\/p>\n<ul>\n<li>\u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u062b\u0627\u0628\u062a \u0645\u0642\u0627\u0628\u0644 \u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u062f\u064a\u0646\u0627\u0645\u064a\u0643\u064a (Static vs. Dynamic Security Testing)\n<ul>\n<li>\u0627\u062e\u062a\u0628\u0627\u0631 \u0623\u0645\u0627\u0646 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u062b\u0627\u0628\u062a (Static Application Security Testing &#8211; SAST): \u0641\u062d\u0635\u00a0\u0627\u0644\u0643\u0648\u062f \u0628\u062d\u062b\u064b\u0627 \u0639\u0646 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629.<\/li>\n<li>\u0627\u062e\u062a\u0628\u0627\u0631 \u0623\u0645\u0627\u0646 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u062f\u064a\u0646\u0627\u0645\u064a\u0643\u064a (Dynamic Application Security Testing &#8211; DAST): \u0641\u062d\u0635 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0642\u064a\u062f \u0627\u0644\u062a\u0634\u063a\u064a\u0644 \u0628\u062d\u062b\u064b\u0627 \u0639\u0646 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641.<\/li>\n<\/ul>\n<\/li>\n<li>\u0623\u0641\u0636\u0644 \u0627\u0644\u0645\u0645\u0627\u0631\u0633\u0627\u062a \u0644\u0644\u0645\u062e\u062a\u0628\u0631\u064a\u0646 \u0627\u0644\u0645\u0647\u062a\u0645\u064a\u0646 \u0628\u0627\u0644\u0623\u0645\u0627\u0646 (Best Practices):\n<ul>\n<li>\u0627\u062e\u062a\u0628\u0627\u0631 \u0623\u0645\u0627\u0646 \u0648\u0627\u062c\u0647\u0629 \u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a (Broken authentication &#8211; Exposed secrets)<\/li>\n<li>\u0625\u062c\u0631\u0627\u0621 \u0627\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0635\u062d\u0629 \u0627\u0644\u0645\u062f\u062e\u0644\u0627\u062a (Prevent SQL injection &#8211; XSS attacks)<\/li>\n<li>\u0627\u062e\u062a\u0628\u0627\u0631 Session Hijacking \u0648 Broken Access Controls<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>\u062b\u0627\u0644\u062b\u064b\u0627:\u00a0\u0623\u062a\u0645\u062a\u0629 \u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0623\u0645\u0627\u0646 \u0641\u064a\u00a0\u0627\u0644\u0640\u00a0CI\/CD<\/strong><\/p>\n<p>\u064a\u062c\u0628 \u0623\u0646 \u064a\u0643\u0648\u0646 \u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0623\u0645\u0627\u0646 \u0645\u0633\u062a\u0645\u0631\u064b\u0627 (continuous). \u0643\u0630\u0644\u0643 \u064a\u0645\u0643\u0646\u00a0\u062f\u0645\u062c \u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0623\u0645\u0627\u0646 \u0641\u064a \u0627\u0644\u0640 CI\/CD \u0648\u0627\u0644\u062a\u0631\u0643\u064a\u0632 \u0639\u0644\u0649 \u0627\u0644\u062c\u0648\u0627\u0646\u0628 \u0627\u0644\u062a\u0627\u0644\u064a\u0629:<\/p>\n<ul>\n<li>\u0623\u062f\u0648\u0627\u062a \u0627\u0644\u0645\u0633\u062d \u0627\u0644\u0623\u0645\u0646\u064a \u200b\u200b\u0627\u0644\u0622\u0644\u064a (OWASP ZAP\u00a0&#8211; Burp Suite\u00a0&#8211; SonarQube).<\/li>\n<li>Shift-left Security:\u00a0\u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631 \u0641\u064a \u0648\u0642\u062a \u0645\u0628\u0643\u0631 \u0645\u0646 \u0627\u0644\u062a\u0637\u0648\u064a\u0631.<\/li>\n<li>\u0625\u062c\u0631\u0627\u0621 \u0639\u0645\u0644\u064a\u0627\u062a \u0641\u062d\u0635 \u0627\u0644\u062a\u0628\u0639\u064a\u0651\u0629 (dependency checks) \u0644\u0645\u0646\u0639 \u0647\u062c\u0645\u0627\u062a \u0633\u0644\u0633\u0644\u0629 \u0627\u0644\u062a\u0648\u0631\u064a\u062f (supply chain attacks).<\/li>\n<\/ul>\n<p>\u064a\u0645\u0643\u0646 \u0627\u0644\u0627\u0633\u062a\u0641\u0627\u062f\u0629 \u0645\u0646 \u0627\u0644\u0623\u062f\u0648\u0627\u062a \u0627\u0644\u062a\u0627\u0644\u064a\u0629:<\/p>\n<ul>\n<li><strong>\u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0623\u0645\u0627\u0646 \u0627\u0644\u0645\u062f\u0639\u0648\u0645 \u0628\u0627\u0644\u0630\u0643\u0627\u0621 \u0627\u0644\u0627\u0635\u0637\u0646\u0627\u0639\u064a (AI-Powered):<\/strong> \u064a\u0633\u062a\u062e\u062f\u0645 \u0627\u0644\u0630\u0643\u0627\u0621 \u0627\u0644\u0627\u0635\u0637\u0646\u0627\u0639\u064a \u0644\u0644\u0643\u0634\u0641 \u0639\u0646 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0628\u0634\u0643\u0644 \u0623\u0633\u0631\u0639.<\/li>\n<li><strong>\u0627\u062e\u062a\u0628\u0627\u0631 Fuzz:<\/strong> \u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0625\u062f\u062e\u0627\u0644 \u0627\u0644\u0639\u0634\u0648\u0627\u0626\u064a \u0628\u062d\u062b\u064b\u0627 \u0639\u0646 \u0639\u064a\u0648\u0628 \u0623\u0645\u0646\u064a\u0629 \u063a\u064a\u0631 \u0645\u062a\u0648\u0642\u0639\u0629.<\/li>\n<li>\u0641\u062d\u0635 \u0623\u0645\u0627\u0646 \u0627\u0644\u0640 Container: \u0636\u0645\u0627\u0646 \u0623\u0645\u0627\u0646 Docker \u0648 Kubernetes.<\/li>\n<\/ul>\n<p><strong>\u0631\u0627\u0628\u0639\u064b\u0627:\u00a0\u0623\u0645\u0627\u0646 \u0648\u0627\u062c\u0647\u0629 \u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a (API)\u00a0&#8211; \u0627\u0644\u062a\u0647\u062f\u064a\u062f \u0627\u0644\u0623\u0643\u062b\u0631 \u0625\u0647\u0645\u0627\u0644\u064b\u0627<\/strong><\/p>\n<p>\u0625\u0630\u0627 \u0639\u0644\u0645\u0646\u0627 \u0623\u0646 80% \u0645\u0646 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u0627\u0644\u062d\u062f\u064a\u062b\u0629 \u062a\u0633\u062a\u0647\u062f\u0641 \u0648\u0627\u062c\u0647\u0627\u062a \u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a\u060c \u0627\u0644\u0633\u0624\u0627\u0644 \u0647\u0646\u0627 \u0643\u064a\u0641 \u064a\u0645\u0643\u0646 \u0623\u0646 \u0646\u062e\u062a\u0628\u0631\u0647\u0627 \u0628\u0630\u0643\u0627\u0621\u061f \u0647\u0630\u0647\u00a0\u0627\u062e\u062a\u0628\u0627\u0631\u0627\u062a \u0623\u0645\u0627\u0646 \u0648\u0627\u062c\u0647\u0629 \u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u0631\u0626\u064a\u0633\u064a\u0629:<\/p>\n<ul>\n<li><strong>\u0627\u0644\u0645\u0635\u0627\u062f\u0642\u0629 \u0648\u0627\u0644\u062a\u0641\u0648\u064a\u0636 (Authentication &amp; Authorization):<\/strong> \u0645\u064e\u0646\u0652\u0639 \u0627\u0644\u0648\u0635\u0648\u0644 \u063a\u064a\u0631 \u0627\u0644\u0645\u0635\u0631\u0651\u062d \u0628\u0647.<\/li>\n<li><strong>\u062a\u062d\u062f\u064a\u062f \u0627\u0644\u0645\u064f\u0639\u062f\u0651\u0644 \u0648\u062a\u0642\u064a\u064a\u062f\u0647 (Rate Limiting &amp; Throttling):<\/strong> \u0627\u0644\u062d\u0645\u0627\u064a\u0629 \u0645\u0646 \u0647\u062c\u0645\u0627\u062a \u0627\u0644\u0642\u0648\u0629 \u0627\u0644\u063a\u0627\u0634\u0645\u0629 (brute force).<\/li>\n<li><strong>\u0627\u0644\u062a\u0634\u0641\u064a\u0631 \u0648\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a (Encryption &amp; Data Protection):<\/strong> \u0627\u0644\u062a\u0623\u0643\u0651\u062f \u0645\u0646 \u0639\u062f\u0645\u00a0\u0643\u064e\u0634\u0652\u0641 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 (not exposed).<\/li>\n<\/ul>\n<p>\u0627\u0644\u0646\u0642\u0637\u0629 \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629 \u0647\u064a: \u0625\u0630\u0627 \u0644\u0645 \u062a\u0642\u064f\u0645 \u0628\u0627\u062e\u062a\u0628\u0627\u0631 \u0623\u0645\u0627\u0646 \u0648\u0627\u062c\u0647\u0629 \u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a\u060c \u0641\u0623\u0646\u062a \u0644\u0627 \u062a\u062e\u062a\u0628\u0631 \u0627\u0644\u0623\u0645\u0627\u0646 \u0639\u0644\u0649 \u0627\u0644\u0625\u0637\u0644\u0627\u0642.<\/p>\n<p><strong>\u062e\u0627\u0645\u0633\u064b\u0627:\u00a0\u062b\u0642\u0627\u0641\u0629 \u0627\u0644\u0623\u0645\u0627\u0646 &#8211; \u0645\u0647\u0646\u062f\u0633\u0648 \u0627\u0644\u062c\u0648\u062f\u0629 \u0643\u0645\u062f\u0627\u0641\u0639\u064a\u0646 \u0639\u0646 \u0627\u0644\u0623\u0645\u0627\u0646<\/strong><\/p>\n<p>\u0625\u0646 \u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0630\u0643\u064a \u064a\u0639\u0646\u064a \u0627\u0644\u062a\u0623\u062b\u064a\u0631 \u0639\u0644\u0649 \u0627\u0644\u0641\u0631\u064a\u0642 \u0628\u0623\u0643\u0645\u0644\u0647. \u064a\u0645\u0643\u0646 \u0628\u0646\u0627\u0621\u00a0\u062b\u0642\u0627\u0641\u0629 <strong>\u0627\u0644\u0623\u0645\u0627\u0646 \u0623\u0648\u0644\u064b\u0627<\/strong> \u0645\u0646 \u062e\u0644\u0627\u0644:<\/p>\n<ul>\n<li>\u062a\u0634\u062c\u064a\u0639\u00a0\u0627\u0644\u0648\u0639\u064a \u0627\u0644\u0623\u0645\u0646\u064a \u200b\u200b\u0641\u064a \u0641\u0650\u0631\u064e\u0642 \u0627\u0644\u062a\u0637\u0648\u064a\u0631.<\/li>\n<li>\u0625\u062c\u0631\u0627\u0621 \u0645\u0631\u0627\u062c\u0639\u0627\u062a \u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0623\u0645\u0627\u0646 \u0641\u064a\u00a0\u0627\u0644\u0640\u00a0sprint retrospectives.<\/li>\n<li>\u062a\u062d\u062f\u0651\u064a \u0627\u0644\u0645\u0637\u0648\u0651\u0631\u064a\u0646: <em>\u0645\u0627 \u0647\u0648 \u0623\u0633\u0648\u0623 \u0634\u064a\u0621 \u064a\u0645\u0643\u0646 \u0623\u0646 \u064a\u062d\u062f\u062b \u0625\u0630\u0627 \u0641\u0634\u0644 \u0647\u0630\u0627\u061f<\/em><\/li>\n<\/ul>\n<p>\u0644\u0627 \u064a\u0646\u0628\u063a\u064a \u0639\u0644\u0649 \u0627\u0644\u0645\u062e\u062a\u0628\u0631\u064a\u0646 \u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u0623\u062e\u0637\u0627\u0621 \u0641\u062d\u0633\u0628\u060c \u0628\u0644 \u064a\u062c\u0628 \u0639\u0644\u064a\u0647\u0645 \u0623\u064a\u0636\u064b\u0627 \u0645\u0646\u0639 \u0627\u0644\u0627\u062e\u062a\u0631\u0627\u0642\u0627\u062a. \u0625\u0646 \u0627\u0644\u0623\u0645\u0627\u0646 \u0647\u0648 \u0645\u0633\u0623\u0644\u0629 \u062c\u0648\u062f\u0629 \u0648\u0639\u0644\u0649 \u0645\u0647\u0646\u062f\u0633\u064a \u0627\u0644\u062c\u0648\u062f\u0629 \u0623\u0646 \u064a\u062a\u0648\u0644\u0648\u0627 \u0632\u0645\u0627\u0645 \u0627\u0644\u0645\u0628\u0627\u062f\u0631\u0629.<\/p>\n<p><strong>\u0627\u0644\u0641\u0643\u0631\u0629 \u0627\u0644\u062e\u062a\u0627\u0645\u064a\u0629: \u0645\u0633\u062a\u0642\u0628\u0644 \u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0623\u0645\u0627\u0646<\/strong><\/p>\n<p>\u062a\u0643\u0644\u0641\u0629 \u0625\u0635\u0644\u0627\u062d \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u0627\u0644\u0640 production \u0623\u0639\u0644\u0649 \u0628\u062b\u0644\u0627\u062b\u064a\u0646 \u0636\u0639\u0641\u064b\u0627 \u0645\u0646 \u0627\u0643\u062a\u0634\u0627\u0641\u0647\u0627 \u0641\u064a \u0645\u0631\u062d\u0644\u0629 \u0627\u0644\u062a\u0637\u0648\u064a\u0631. \u0645\u0627\u0630\u0627 \u0644\u0648 \u0627\u0633\u062a\u0637\u0639\u0646\u0627 \u0645\u0646\u0639 \u0627\u0644\u0645\u0634\u0627\u0643\u0644 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0642\u0628\u0644 \u062d\u062f\u0648\u062b\u0647\u0627\u061f<\/p>\n<p>\u0627\u0644\u0646\u0642\u0627\u0637 \u0627\u0644\u0631\u0626\u064a\u0633\u064a\u0629:<\/p>\n<ul>\n<li>\u0627\u062e\u062a\u0628\u0627\u0631 \u0627\u0644\u0623\u0645\u0627\u0646 \u0647\u0648 \u062c\u0632\u0621 \u0645\u0646 \u0636\u0645\u0627\u0646 \u0627\u0644\u062c\u0648\u062f\u0629\u00a0(Quality Assurance) \u0648\u0644\u064a\u0633 \u0645\u0646\u0641\u0635\u0644\u0627\u064b \u0639\u0646\u0647.<\/li>\n<li>\u0623\u0641\u0636\u0644 \u0645\u062e\u062a\u0628\u0631\u064a \u0627\u0644\u0623\u0645\u0627\u0646 (security testers) \u064a\u0641\u0643\u0651\u0631\u0648\u0646 \u0645\u062b\u0644 \u0627\u0644\u0647\u0627\u0643\u0631\u0632.<\/li>\n<li>\u064a\u062c\u0628 \u0623\u0646 \u064a\u0643\u0648\u0646 \u0623\u0645\u0627\u0646 \u0648\u0627\u062c\u0647\u0629 \u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a (API) \u0639\u0644\u0649 \u0631\u0623\u0633 \u0627\u0644\u0623\u0648\u0644\u0648\u064a\u0627\u062a.<\/li>\n<li>\u064a\u0645\u0643\u0646 \u0644\u0644\u0623\u062a\u0645\u062a\u0629 \u0648\u0627\u0644\u0630\u0643\u0627\u0621 \u0627\u0644\u0627\u0635\u0637\u0646\u0627\u0639\u064a \u062a\u0639\u0632\u064a\u0632 \u0627\u0644\u0630\u0643\u0627\u0621 \u0627\u0644\u0628\u0634\u0631\u064a \u0641\u064a \u0627\u062e\u062a\u0628\u0627\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0627\u0646 \u0648\u0644\u064a\u0633 \u0627\u0633\u062a\u0628\u062f\u0627\u0644\u0647.<\/li>\n<\/ul>\n<p>\u0648\u0623\u062e\u064a\u0631\u064b\u0627:\u00a0\u0627\u062e\u062a\u0628\u0631 \u0628\u0630\u0643\u0627\u0621. \u0627\u062e\u062a\u0628\u0631 \u0628\u0623\u0645\u0627\u0646. \u0643\u0646 \u062e\u0637 \u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u0623\u062e\u064a\u0631.<\/p>\n<p>* \u0627\u0644\u0645\u0635\u062f\u0631: Spartans Summit 2025: Test Smarter &#8211; Security Essentials for Quality Engineers<\/p>\n<div id=\"ember890\" class=\"update-v2-social-activity update-v2-social-activity__large-cta-button--content-redesign \">\u00a0** \u0627\u0644\u0635\u0648\u0631\u0629 \u0645\u0646 \u0645\u0648\u0642\u0639:\u00a0https:\/\/community.lambdatest.com<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u0641\u064a \u0647\u0630\u0627 \u0627\u0644\u0645\u0648\u0636\u0648\u0639 \u0627\u0633\u062a\u0639\u0631\u0627\u0636 \u0644\u0644\u062a\u063a\u064a\u0651\u0631\u00a0\u0627\u0644\u062d\u0627\u0635\u0644 \u0641\u064a \u062f\u0648\u0631 \u0645\u0647\u0646\u062f\u0633\u064a \u0627\u0644\u062c\u0648\u062f\u0629 \u0623\u062b\u0646\u0627\u0621 \u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631\u0627\u062a \u0648\u0630\u0644\u0643 \u0641\u064a \u0623\u062f\u0627\u0621 \u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631\u0627\u062a \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0627\u0644\u0623\u0645\u0627\u0646. \u0623\u064a\u0636\u064b\u0627 \u0646\u062a\u0639\u0631\u0651\u0641 \u0639\u0644\u0649 \u062e\u0645\u0633\u0629 \u0623\u0633\u0627\u0633\u064a\u0627\u062a \u0623\u0645\u0646\u064a\u0629 \u0631\u0626\u064a\u0633\u064a\u0629 \u0644\u0645\u0647\u0646\u062f\u0633\u064a \u0627\u0644\u062c\u0648\u062f\u0629.<\/p>\n","protected":false},"author":2,"featured_media":2723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"footnotes":""},"categories":[6],"tags":[877,1216,918,1211,1212,1089,1209,1215,1218,1217,515,814,800,1213,29,924,1210,1214,978],"class_list":["post-2701","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-testing","tag-api","tag-dynamic-application-security-testing","tag-quality-assurance","tag-quality-engineer","tag-security-team","tag-security-testing","tag-spartans-summit-2025","tag-static-application-security-testing","tag-1218","tag-1217","tag-testing","tag-814","tag-800","tag-1213","tag-29","tag-924","tag-1210","tag-1214","tag-978","post_format-post-format-image"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.AnwarBosbool.com\/ar\/wp-content\/uploads\/2025\/04\/Spartans-Summit-2025.png","_links":{"self":[{"href":"https:\/\/www.AnwarBosbool.com\/ar\/wp-json\/wp\/v2\/posts\/2701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.AnwarBosbool.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.AnwarBosbool.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.AnwarBosbool.com\/ar\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.AnwarBosbool.com\/ar\/wp-json\/wp\/v2\/comments?post=2701"}],"version-history":[{"count":32,"href":"https:\/\/www.AnwarBosbool.com\/ar\/wp-json\/wp\/v2\/posts\/2701\/revisions"}],"predecessor-version":[{"id":2734,"href":"https:\/\/www.AnwarBosbool.com\/ar\/wp-json\/wp\/v2\/posts\/2701\/revisions\/2734"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.AnwarBosbool.com\/ar\/wp-json\/wp\/v2\/media\/2723"}],"wp:attachment":[{"href":"https:\/\/www.AnwarBosbool.com\/ar\/wp-json\/wp\/v2\/media?parent=2701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.AnwarBosbool.com\/ar\/wp-json\/wp\/v2\/categories?post=2701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.AnwarBosbool.com\/ar\/wp-json\/wp\/v2\/tags?post=2701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}