Also known as Split or bucket testing. Method to compare two web Page or application (an original version called as controlled and modified version called as a variation) in order to find which one is better
3. A/B Testing
• Also known as Split or
bucket testing.
• Method to compare
two web Page or
application (original
version called as
controlled and modified
version called as
variation) in order to
find which one is better Control Variation
4. • B2B Company use this to improve the user
experience
• Stages of AB testing
• Tools: Unbounce, VWO, Maxymizer, A/Bingo, and
more.
Collect
Data
Determine
conversion
to improve
Generate
Hypothesis
Identify the
variables
and create
variations
Run
Experiment
Analyze
Result
5. Responsive testing
The web application built is
said to responsive web design
if the web pages displays
properly, acquiring the whole
web page efficiently on
various different devices, like
smart-phones, tablets, and
laptops or desktops to view
websites or portals, and
screen sizes and resolution
without sacrificing either the
application content or user
experience.
Tools: CyberCrab
6. White box testing
• Aim is to check how system is performing based on detail design document
• Other names Clear box, open box, transparent box, glass box , and structural testing
• Test the internal structure, code structure, branches, conditions, loops and working of the
application
• Internal perspective, implementation and programming skills are required used for test case
designing
• Carried out by software developers
• Applicable to Unit and integration levels.
• Includes Unit testing, Integration testing, structural testing, logic testing, path testing, code testing
(code coverage, segment, branch coverage),loop testng, data flow testing, etc.
7. Black box testing
• Aim is to check the functionality of the system under test based on
Requirement (functional) specification document
• Referred as Specification based testing, functional , external testing,
behavior, close box testing
• Focus on generated output for the given input ignoring the internal
structure/mechanism.
• Software Tester perform the testing
• Applied at System and acceptance levels.
8. Regression testing
• Aims to ensure that previously developed and tested system has
not effect the existing feature after the changes (and interfacing)
being done.
• It is done by partially or fully selecting the already executed test
cases based on traceability matrix
• Needed when there is change in the Requirement or code change,
new feature added, defect is fixed, performance issue is fixed
Retesting all
Regression test selection
Prioritizing
9. Performance Testing
• Aim to ensure that the application perform well under the
certain workload, what needs to be improved
• Test : Speed, Scalability and Stability
• Also called “Perf Testing”
• Includes: load, stress, endurance, spike, volume, scalability
testing
• Needed to avoid the issues: running slow while several users
use it simultaneously, inconsistencies across different
operating systems and poor usability
• Tools: LoadRunner, Jmeter, NeoLoad
• Process: Identify test environment, Determine performance
criteria, Plan and Design, Configure test Environment,
Implement test design, Run the test, analyze, tune and retest
10. Security Testing
• Aims at verifying Confidentiality, integrity, Authentication,
authorization, availability , non-repudiation.
• Security is done to protect from unforeseen actions
(intentional/unintentional) that cause app to stop functioning or
being exploited and to find these loopholes security testing is
needed
• Tools: FxCop, FindBugs, GrammaTech, Veracode
• Techniques: Injection, Broken Authentication and Session
Management, Cross-Site Scripting (XSS), Insecure Direct Object
References, Security Mis-configuration, Sensitive Data Exposure,
Missing Function Level Access Control, Cross-Site Request Forgery
(CSRF), Using Components with Known Vulnerabilities, Unvalidated
Redirects and Forwards.
• Includes: Vulnerability Scanning, Security Scanning, Penetration
testing, Risk Assessment, Security Auditing, Ethical hacking.