OWASP and Security Concepts for Software Developers

Catalog Home Microsoft Visual Studio .NET and SharePoint .NET Application Security
18.204.227.117
Your Training Location:  

OWASP and Security Concepts for Software Developers

Instructor Led
Loading Course Dates...
Failed
No available dates in this city.

  Available by Request
{{date.date_begin | date:'M/d'}} - {{date.date_end | date:'M/d/yyyy'}}
   Free{{date.date_price}}
 
ViewHide Additional Dates

This course for Developers is designed to expose software developers to the key security concepts that they need to know to gain a full appreciation of secure coding. This is mostly a language-agnostic course that focuses on the concepts, techniques, and mechanisms required to secure data and to create secure software that enforces and maintains data protection. Most developers are aware of some of these concepts, but they do not fully appreciate the significance of each in relation to the others, and how these topics ultimately affect their ability to evaluate and implement secure coding practices. Any factors that affect software security should be carefully considered and fully understood. This course helps ensure that developers are adequately equipped to make properly informed choices during each coding project.

Before taking this course, students should have some development experience to complete the lab exercises.

5 Days/Lecture & Lab

This course is designed for Developers with Java programming experience.

  • Security Goals
  • Secure Systems Design
  • Secure Design Principles
  • Worms and Other Malware
  • Buffer Overflows
  • Client-State Manipulation
  • SQL Injection
  • Password Security
  • Jumping into the OWASP Top 10
  • A1: Injection
  • A2: Broken Authentication
  • A3: Sensitive Data Exposure
  • A4: XML External Entities (XXE)
  • A5: Broken Access Control
  • A6: Security Misconfiguration
  • A7: Cross Site Scripting (XSS)
  • Cross-Domain Security in Web Applications
  • Symmetric Key Cryptography
  • Key Management and Exchange
  • MACs and Signatures
  • Appendix A: Hacking and Penetration Testing
  • API Security – If time allows





Copyright © 2020 ProTech. All Rights Reserved.

Sign In Create Account

Navigation

Social Media