Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

SECURE .NET CODING (TT8200-N)

Developing Secure Standalone and Desktop C# .NET Applications

GK# 1160 Vendor# TT8200-N

Course Overview

TOP

In this course, you will learn the best practices for designing, implementing, and deploying secure programs in .NET. You will take an application from requirements through to implementation, analyzing and testing for software vulnerabilities. This course explores well beyond basic programming skills, teaching developers sound processes and practices to apply to the entire software development lifecycle.

You will step through a series of vulnerabilities illustrating in the right way to implement secure .NET applications, and also examine several design patterns that can be used to facilitate better application architecture, design, implementation, and deployment.

You will also learn about current, real examples that illustrate the potential consequences of not following these best practices. Although this edition of the course is .NET-specific, it may also be presented using Java or other programming languages.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Concepts and terminology behind defensive coding
  • Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against assets
  • Entire spectrum of threats and attacks that take place against software applications in today's world
  • Threat Modeling to identify potential vulnerabilities in a real life case study
  • Static code reviews and dynamic application testing for uncovering vulnerabilities in .NET applications
  • Vulnerabilities of the .NET programming language and the runtime environment as well as how to harden both
  • Work with .NET platform security to gain an appreciation for what is protected and how
  • Cryptography and encryption and where they fit in the overall security picture
  • .NET Cryptographic services
  • How role-based security works in .NET and use it to control access
  • How Code Access Security (CAS) works and use it to control access
  • Mechanics of isolated storage
  • Fundamentals of XML Digital Signature and XML Encryption

Who Should Attend

TOP

Application project stakeholders who wish to develop secure Java applications

Follow-On Courses

TOP
Course Delivery
Request this course in a different delivery format.
Enroll