Certified Application Security Engineer (CASE) . Net + Exam [CASE-NET]

Durée totale
Localisation
A cet endroit, En ligne
Date et lieu de début
Logo Global Knowledge Belgium BV
Note du fournisseur: starstarstar_halfstar_borderstar_border 4,5 Global Knowledge Belgium BV a une moyenne de 4,5 (basée sur 2 avis)

Astuce: besoin de plus d'informations sur la formation? Téléchargez la brochure!

Dates et lieux de début

placeMechelen (Zandvoortstraat 1)
10 mai 2021 jusqu'au 12 mai 2021
computer En ligne: VIRTUAL TRAINING CENTRE
10 mai 2021 jusqu'au 12 mai 2021

Description

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

Het CASE-NET - Certified Application Security Engineer- certificaat geeft u internationale erkenning vanuit EC-Council. Het CASE-NET examen voucher is bij de 3 daagse cursus inbegrepen.

The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally. The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment.

The CASE certified training program is developed concurrently to prepare softwar…

Lisez la description complète ici

Foire aux questions (FAQ)

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Vous n'avez pas trouvé ce que vous cherchiez ? Voir aussi : CISSP, Sécurité informatique, Cisco Expert (CCDE / CCIE), CISM et CAPM.

Vrijwel iedere training die op een onze locaties worden getoond zijn ook te volgen vanaf huis via Virtual Classroom training. Dit kunt u bij uw inschrijving erbij vermelden dat u hiervoor kiest.

OVERVIEW

Het CASE-NET - Certified Application Security Engineer- certificaat geeft u internationale erkenning vanuit EC-Council. Het CASE-NET examen voucher is bij de 3 daagse cursus inbegrepen.

The Certified Application Security Engineer (CASE) credential is developed in partnership with large application and software development experts globally. The CASE credential tests the critical security skills and knowledge required throughout a typical software development life cycle (SDLC), focusing on the importance of the implementation of secure methodologies and practices in today’s insecure operating environment.

The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally.It is designed to be a hands-on, comprehensive application security course that will help software professionals create secure applications. The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application.

Unlike other application security trainings, CASE goes beyond just the guidelines on secure coding practices and includes secure requirement gathering, robust application design, and handling security issues in post development phases of application development. This makes CASE one of the most comprehensive certifications on the market today. It is desired by software application engineers, analysts, testers globally, and respected by hiring authorities.

 

OBJECTIVES

After completing this course you should be able to:

  • Understand secure SDLC and secure SDLC models in-depth
  • Apply the knowledge of OWASP Top 10, threat modelling, SAST and DAST
  • Capture security requirements of an application in development
  • Define, maintain and enforce application security best practices
  • Perform manual and automated code review of application
  • Conduct application security testing for web applications to assess the vulnerabilities
  • Drive the development of a holistic application security program
  • Rate the severity of defects and publishing comprehensive reports detailing associated risks and mitigations
  • Work in teams to improve security posture
  • Use Application security scanning technologies such as AppScan, Fortify, WebInspect, static application security testing (SAST), dynamic application security testing (DAST), single sign-on, and encryption
  • Follow secure coding standards that are based on industry-accepted best practices such as OWASP Guide, or CERT Secure Coding to address common coding vulnerabilities.
  • Create a software source code review process that is a part of the development cycles (SDLC, Agile, CI/CD)

AUDIENCE

Individuals involved in the role of developing, testing, managing, or protecting a wide area of applications or individuals hoping to become application security engineers/analysts/testers

CERTIFICATION

Recommended as preparation for the following exams:

  • EC-Council Certified Application Security Engineer Exam - Candidates for this exam must have attended CASE training through an accredited EC-Council Partner and meet the other EC-Council Eligilibity Criteria.

An exam voucher is included at this training.

CONTENT

Understanding Application Security, Threats and Attacks

  • What is a Secure Application
  • Need for Application Security
  • Most Common Application Level Attacks
  • Why Applications become Vulnerable to Attacks
  • What Consistutes Comprehensive Application Security ?
  • Insecure Application: A Software Development Problem
  • Software Security Standards, Models and Frameworks

Security Requirements Gathering

  • Importance of Gathering Security Requirements
  • Security Requirement Engineering (SRE)
  • Abuse Case and Security Use Case Modeling
  • Abuser amd Security Stories
  • Security Quality Requirements Engneering (SQUARE)
  • Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE)

Secure Application Design and Architecture

  • Relative Cost of Fixing Vulnerabilities at Different Phases of SDLC
  • Secure Application Design and Architecture
  • Goal of Secure Design Process
  • Secure Design Actions
  • Secure Design Principles
  • Threat Modeling
  • Decompose Application
  • Secure Application Architecture

Secure Coding Practices for Input Validation

  • Input Validation
  • Why Input Validation ?
  • Input Validation Specification
  • Input Validation Approaches
  • Input Filtering
  • Secure Coding Practices for Input Validation: Web Forms
  • Secure Coding Practices for Input Validation: ASP.NET Core
  • Secure Coding Practices for Input Validation: MVC

Secure Coding Practices for Authentication and Authorization

  • Authentication and Authorization
  • Common Threats on User Authentication and Authorization
  • Authentication and Authorization: Web Forms
  • Authentication and Authorization: ASP .NET Core
  • Authentication and Authorization: MVC
  • Authentication and Authorization Defensive Techniques : Web Forms
  • Authentication and Authorization Defensive Techniques : ASP .NET Core
  • Authentication and Authorization Defensive Techniques : MVC 

Secure Coding Practices for Cryptography

  • Cryptographic
  • Ciphers
  • Block Ciphers Modes
  • Symmetric Encryption Keys
  • Asymmetric Encryption Keys
  • Functions of Cryptography
  • Use of Cryptography to Mitigate Common Application Security Threats
  • Cryptographic Attacks
  • Techniques Attackers Use to Steal Cryptographic Keys
  • What should you do to Secure .Net Applications for Cryptographic Attacks
  • .NET Cryptographic Name Spaces
  • .NET Cryptographic Class Hierarchy
  • Symmetric Encryption
  • Symmetric Encryption: Defensive Coding Techniques
  • Asymmetric Encryption
  • Asymmetric Encryption: Defensive Coding Techniques
  • Hashing
  • Digital Signatures
  • Digital Certificates
  • XML SIgnatures
  • ASP.NET Core Specific Secure Cryptography Practices

Secure Coding Practices for Session Management

  • What are Exceptions/Runtime Errors ?
  • Need for Secure Error/Exception Handling
  • Consequences of Detailed Error Message
  • Exposing Detailed Error Messages
  • Considerations: Designing Secure Error Messages
  • Secure Exception Handling
  • Handling Exceptions in an Application
  • Defensve Coding practices against Information Disclosure
  • Defensive Coding practices against Improper Error Handling
  • ASP .NET Core: Secure Error Handling Practices
  • Secure Auditing and Logging
  • Tracing .NET
  • Auditing and Logging Security Checklists

Static and Dynamic Application Security Testing (SAST and DAST)

  • Static Application Security Testing
  • Manual Secure Code Review for Most Common Vulnerabilities
  • Code Review: Check List Approach
  • SAST Finding
  • SAST Report
  • Dynamic Application Security Testing
  • Automated Application Vulnerability Scanning Tools
  • Proxy-based Security Testing Tools
  • Choosing between SAST and DAST

Secure Deployment and Maintenance

  • Secure Deployment
  • Prior Deployment Activity
  • Deployment Activities: Ensuring Security at Various Levels
  • Ensuring Security at Host Level
  • Ensuring Security at Network Level
  • Ensuring Security at Application Level
  • Web Application Firewall (WAF)
  • Ensuring Security at IIS Level
  • Sites and Virtual Directories
  • ISAPI Filters
  • Ensuring Security at .NET Level
  • Ensuring Security at SQL Server Level
  • Security Maintenance and Monitoring

 

 

 

 

 

 

 

 

 

Rester à jour sur les nouveaux avi

Pas encore d'avis.

Partagez vos avis

Avez-vous participé à cours? Partagez votre expérience et aider d'autres personnes à faire le bon choix. Pour vous remercier, nous donnerons 1,00 € à la fondation Stichting Edukans.

Il n'y a pour le moment aucune question fréquente sur ce produit. Si vous avez besoin d'aide ou une question, contactez notre équipe support.

Recevoir une brochure d'information (gratuit)

Sexe:
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)
(optionnel)

Vous avez des questions?

(optionnel)
Nous conservons vos données personnelles dans le but de vous accompagner par email ou téléphone.
Vous pouvez trouver plus d'informations sur : Politique de confidentialité.