Course Details
Course Outline
1 - Bug Hunting Foundation
Why Hunt Bugs?Safe and Appropriate Bug Hunting/Hacking
2 - Scanning Web Applications
Scanning Applications Overview
3 - Moving Forward from Hunting Bugs
Removing Bugs
4 - Foundation for Securing Applications
Principles of Information Security
5 - Bug Stomping 101
Unvalidated DataInjectionBroken AuthenticationSensitive Data ExposureXML External Entities (XXE)Broken Access Control
6 - Bug Stomping 102
Security MisconfigurationCross Site Scripting (XSS)Deserialization/Vulnerable ComponentsInsufficient Logging and MonitoringSpoofing, CSRF, and Redirects
7 - Moving Forward with Application Security
Applications: What Next?.NET Issues and Best PracticesMaking Application Security Real
8 - Time Permitting Topics
Cryptography Overview.NET Cryptographic Services
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required.
Other Prerequisites
TTCN2100 C# .Net Programming Fundamentals
TT8324 Developing Secure Software Applications
Refresher training for updated skills or to fulfill PCI compliant requirements
Our catalog includes a wide variety of learning paths for leveraging .Net for next-level development, testing, security and more.