Entire course includes...
- 700 pages of courseware
- 4 day(s) of hands-on content
- Step-by-step hands-on labs
- Sample Files
In Level 1 you will learn how to..
- Administer security policy.
- Create and digitally sign assemblies.
- Validate data and handle errors safely.
- Choose the right permission set for your code.
- Manage Windows security.
- Use Windows role-based security in your applications.
- Work with Isolated Storage.
- Security as a System
- Security in .NET
- Designing Secure Systems
- Security Policy in the CLR
- Configuring Policy
- Working with Command Line Tools
- Other Security Tools
- Assembly Overview
- Exception Handling
- Protecting Source Code
- Coding Best Practices
- Permission Requests
- Determining Effective Permissions
- Windows Security Basics
- DACLs and .NET
- Role-Based Security Overview
- .NET Security Classes
- Implementing Application Security
- Understanding Isolated Storage
- Mechanics of Isolated Storage
- Types of Isolation
- Administering Isolated Storage
- Installing SQL Server
- SQL Server in Visual Studio .NET
- SQL Server Security Architecture
In Level 2 you will learn how to...
- Secure your ASP.NET applications effectively.
- Implement ASP.NET security using SQL Server.
- Implement COM+ security with Serviced Components.
- Secure Remoting with IIS and ASP.NET.
- Create secure Web Services.
- Deploy security policy and secure applications.
- Understand Cryptography in .NET.
- Handle common threats like buffer overflows, SQL injection and cross-site scripting
ASP.NET Security
- ASP.NET Security Overview
- Windows Authentication
- Forms Authentication
- Custom Authentication
Enterprise Services
- Enterprise Services Overview
- Creating Serviced Components
- Administering COM+ Security
- Testing the Inventory Application
Security for .NET Remoting
- .NET Remoting Overview
- Hosting Remoting in ASP.NET
- Secure Remoting with IIS and ASP.NET
Web Services
- Web Services Overview
- Disabling Unwanted Protocols
- Secure Web Services with IIS and ASP.NET
Deployment
- Deploying Security Policy
- No-Touch Deployment
- .NET Deployment Options
- Deploying ASP.NET Applications
Cryptography in .NET
- Basic Cryptographic Concepts
- Working with Data
- Using Asymmetric Cryptography
- Hash Codes
- Digital Signatures
- Creating Random Keys
Handling Common Threats
- Thinking About Security
- Buffer Overflows
- SQL Injection
- Cross-Site Scripting
- Keeping Current
- The Human Element
SCREENSHOTS:
No comments:
Post a Comment