Creating Secure .NET Applications
(NFSEC, Live Instructor-Led Training, 4 days)


Description

The ability to build secure code which is resistant to hacker attacks is a key skills for the modern programmer. As applications become a more an more important part of our professional lives, their security vulnerabilities become more and more of a liability. This SETC certified course on secure .NET coding takes programmers on a complete tour of the various security concerns in a .NET application. The discussion includes encryption and message digests, .NET code access security, and .NET role based security. The course concludes with a detailed study of symmetric and asymmetric encryption techniques as well as common hacks and security vulnerabilities.

Dates and Pricing


Jan 30 to Feb 2, 2018$2,500/person Feb 27 to Mar 2, 2018$2,500/person Mar 27 to Mar 30, 2018$2,500/person

Outline

Security Basics
The Technology of Security
Java Security Models
Authorization Vs Authentication
Cryptography
Corporate Security Infra-structure
Security Essentials
Protecting the Content: Encryption
S/mime and Openpgp
Transport Layer Security (tls
SSL
The Message Digest
Digital Signatures
Certificates
The Microsoft Certificate Store
The Java Certificate Store
Symmetric Key Algorithms
Password Based Encryption
NET Code Security
Overview
Designing Secure Classes
Securing Classes
Using Serialization
Securing Packages
File Io
Privileged Code
.NET Security
Overview
Permission Sets and Code Groups
Using Code Access Security
.NET Security Classes
Permissions
Encryption
Overview
Symmetric Vs Asymmetric Encryption
Authentication Methods
.NET Cryptography
.NET Framework Security
Symmetric Encryption
Overview
Password Based Encryption
Keys
Padding
Cipher-streams
Asymmetric Encryption
Overview
Keys, Padding and Modes
Session Key Encryption
File Encryption with Rsa
Key Agreement
Message Security
Overview
Message Digests
Digital Signatures
Certificates
Securing Resources
Securing ASP .NET
Securing XML Web Services
Securing a Database
Other Security Considerations
Common Hacks
Scanning Ports
Session Hijacking
Impersonation
Cross Site Scripting
SQL Injection
Other Hacks