Certified Secure Programming
Date: 22-05-2017 s/d 26-05-2017 | Category: Programming | Instructor: M. Andry Hartawan
ECSP .NET Course
Software defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors in programming. Hence, it has become a must for organizations to educate their software developers about secure coding practices.
Attackers try to find security vulnerabilities in the applications or servers and then try to use these vulnerabilities to steal secrets, corrupt programs and data, and gain control of computer systems and networks. Sound programming techniques and best practices can be used to develop high quality code to prevent web application attacks. Secure programming is a defensive measure against attacks targeted towards application systems.
This course will:
- Familiarize you with .Net Application Security, ASP.Net Security Architecture and help you understand the need for application security and common security threats to .Net framework
- Discuss security attacks on .Net frame work and explain the secure software development life cycle
- Help you to understand common threats to .Net assemblies and familiarize you with stack walking processes
- Discuss the need for input validation, various input validation approaches, common input validation attacks, validation control vulnerabilities, and best practices for input validation
- Familiarize you with authorization and authentication processes and common threats to authorization and authentication
- Discuss various security principles for session management tokens, common threats to session management, ASP.Net session management techniques, and various session attacks
- Cover the importance of cryptography in .Net, different types of cryptographic attacks in .Net, and various .Net cryptography namespaces
- Explain symmetric and asymmetric encryption, hashing concepts, digital certificates, digital and XML signatures
- Describe the principles of secure error handling, different levels of exception handling, and various .Net logging tools
- Examine file handling concepts, file handling security concerns, path traversal attacks on file handling, and defensive techniques against path traversal attack