About the course:
Our Secure .NET Development course is designed for those working within Microsoft's software development ecosystem and aims to give delegates valuable tools and techniques to mitigate risk in business application development.
Development teams are often under so much pressure to deliver that security is sacrificed to the devil of delivery. Most of those in the development team will never have seen many of the threats the organisation faces in having public interfaces. Most teams won’t even realise that the biggest threat they face is internal.
In this training we deliver not only the technical knowledge required to protect data and operations from attackers, both internal and external, but a defensive mindset which ensures that security is implemented all the time. It also teaches how to implement security quickly, efficiently, at the right time, and most importantly, effectively too!
This training uses hands-on technical examples, security tools and teamwork to thoroughly analyse and understand the modern security environment.
Learning outcomes
- Analysing Risk
- Current Threat Vectors
- Client-Side Security
- OWASP Top 10 – Hands On
- Application hardening techniques
- Implementing a Secure Development Cycle
- Threat Modelling
- Encryption
- Penetration Testing techniques
Who should attend
The secure .NET development training course is suitable for Developers, Testers, Business Analysts, DBAs, Architects and includes security content for both front-end and back-end content and code creators.
Prerequisites
Experience of managing, writing or testing .NET code (in C# or VB.NET for instance) with Visual Studio, and / or developing / administrating SQL Server applications and databases.
Live, instructor-led online and on-site training
We appreciate that you need flexibility to fit in with new working situations - whether you're an individual, part of a distributed team, or simply have projects and deadlines to meet.
Our remote training can take place online in a virtual classroom, with content split into modules to accommodate your scheduling challenges and meet your learning goals. Get in touch today to find out how we can help design a cost-effective, flexible training solution.
As soon as it's safe, we'll return to also offering the on-site custom training courses and programmes upon which we've built our reputation.
- Analysing Risk – Understanding your Threats
- Current Threat Vectors used to attack Dev Teams
- Client-Side Security – Protecting your users
- Client-side Secure Design Principles
- Why are Web Applications Insecure?
- OWASP Top 10 – Hands On
- Authentication and Authorization – hardening techniques
- Implementing Secure Development Cycle
- Threat Modelling – Designing Effective protection
- Encryption – Ultimate Data Defence
- Penetration Testing – Tips & Techniques
- Testing for Secure Software - Review