Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

SECURE .NET CODING (TT8200-N)

Developing Secure Standalone and Desktop C# .NET Applications

Vendor# TT8200-N

GK# 1160

Course Overview

In this course, you will learn the best practices for designing, implementing, and deploying secure programs in .NET. You will take an application from requirements through to implementation, analyzing and testing for software vulnerabilities. This course explores well beyond basic programming skills, teaching developers sound processes and practices to apply to the entire software development lifecycle.

You will step through a series of vulnerabilities illustrating in the right way to implement secure .NET applications, and also examine several design patterns that can be used to facilitate better application architecture, design, implementation, and deployment.

You will also learn about current, real examples that illustrate the potential consequences of not following these best practices. Although this edition of the course is .NET-specific, it may also be presented using Java or other programming languages.

Delivery Format Options

  • Private Group Training

    Private Group Training

    Train your entire team in a private, coordinated professional development session at the location of your choice.

    Receive private training for teams online and in-person.

Request a date or location for this course.

What You'll Learn

  • Concepts and terminology behind defensive coding
  • Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against assets
  • Entire spectrum of threats and attacks that take place against software applications in today's world
  • Threat Modeling to identify potential vulnerabilities in a real life case study
  • Static code reviews and dynamic application testing for uncovering vulnerabilities in .NET applications
  • Vulnerabilities of the .NET programming language and the runtime environment as well as how to harden both
  • Work with .NET platform security to gain an appreciation for what is protected and how
  • Cryptography and encryption and where they fit in the overall security picture
  • .NET Cryptographic services
  • How role-based security works in .NET and use it to control access
  • How Code Access Security (CAS) works and use it to control access
  • Mechanics of isolated storage
  • Fundamentals of XML Digital Signature and XML Encryption

Follow-On Courses

Who Needs To Attend

Application project stakeholders who wish to develop secure Java applications

Course Outline

Download Course Outline