Kurs i Microsoft .NET 4.5 og Visual Studio 2012

Glasspaper er en komplett
kurs-leverandør for utviklere!


Combined C/C++, Java and Web application security

Kursavgift: kr 20 900 | Varighet: 4 dager

Beskrivelse:

To serve in the best way heterogeneous development groups that are using various platforms simultaneously during their everyday work, we have merged various topics into a combined course that presents diverse secure coding subjects in didactic manner on a single training event. This course combines C/C++ and Java platform security to provide an extensive, cross-platform secure coding expertise.

Concerning C/C++, common security vulnerabilities are discussed, backed by practical exercises about the attacking methods that exploit these vulnerabilities, with the focus on the mitigation techniques that can be applied to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation.

Security components and service of Java are discussed by presenting the different APIs and tools through a number of practical exercises where participants can gain hands-on experience in using them. The course also covers security issues of Web services and the related Java services that can be applied to prevent the most aching threats of the Internet based services. Finally, web- and Java-related security vulnerabilities are demonstrated by easy-to-understand exercises, which not only show the root cause of the problems, but also demonstrate the attack methods along with the recommended mitigation and coding techniques in order to avoid the associated security problems.





Målgruppe:

C/C++ and Java developers, architects and testers


Forkunnskaper:

Preparedness: Advanced C/C++, Java and Web



Innhold:

  • Security technologies and services:
    Java language security solutions, Java Virtual Machine (JVM) and Java Runtime Environment (JRE); ByteCode Verifier and Classloader; Security Manager and Access Controller, managing permissions with the PolicyTool; Java Cryptography Architecture (JCA) and Java Cryptographic Extension (JCE), Java Secure Socket Extension (JSSE), Java Authentication and Authorization Service (JAAS), Java Keystore (JKS) and the KeyTool; SOAP and REST; Transport-layer security, application- and container-managed authentication, authorization; End-to-end security; Web Services Security (WSS), username/password authentication, signing (XML Signature) and encryption (XML Encryption)

  • Common security vulnerabilities and mitigation techniques:
    Buffer Overflow (BOF), heap overflow; integer problems: widthness bug, signedness bug, arithmetic overflow; Printf Format String bug (PFS); array indexing problems, unicode bug, side channels: the RSA timing attack, Time-of-Checking-to-Time-of-Usage (TOCTTOU) race conditions, Directory Traversal Vulnerability (DTV); No eXecute (NX bit) access mode of Virtual Memory Management (VMM); Data Execution Prevention (DEP); Address Space Layout Randomization (ASLR) – PaX, ExecShield; Stack Smashing Protection (SSP) – /GS, StackGuard, ProPolice; Source Code Analyzers (SCA tools).

  • Java-related vulnerabilities:
    integer overflows in Java (e.g. the CRC32 bug); Calendar/ZoneInfo deserialization bug (CVE 2008-5353); unsafe reflection; injection flaws in Java (SQL Injection, Command Injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF); unsafe Java Native Interface (JNI); improper error and exception handling; insecure randomness of java.util.Random; object hijacking; serialization of sensitive information; dangers of mobile code; Denial-of-Service (DoS) in Java (the “2.2250738585072012e-308 bug”), problem with inner classes, and many more...

  • Exercises:
    exploiting stack overflow – executing shell codes; crafting a printf format attack string – write-what-where (WWW) possibilities; understanding integer problems; applying mitigation techniques; circumventing them by return-to-libc attack or argument overwriting; and many spot- and-correct-the-bug exercises. WS Security with username and password; XMLS Signature; XML Encryption; exploiting SQL injection step-by-step; crafting Cross-Site Scripting attacks; uploading and running executable code; crashing through JNI; proof-of-concept exploit of Calendar/ZoneInfo deserialization bug; using reflection to break accessibility modifiers; object hijacking; preventing serialization; exploiting mobile code vulnerabilities; crashing Java with magic double values; exploiting inner classes.




Epost mottat


Du er nå meldt på nyhetsbrevlisten

Epost mottat


Du er nå meldt på nyhetsbrevlisten

Mailen er sendt:

Ditt tips er registrert og sendt!
Vi håper snarlig å se deg på kurs hos oss!

Feilmelding:

OBS! Vi har problemer med å sende ditt tips!

Vi anbefaler deg å sjekke om du har skrevet inn en gyldig mailadresse.

Tips sjefen

Lyst til å delta på dette kurset, men må overbevise sjefen først?

Glasspaper har laget en tips funksjon, som gjør det enklere for deg å overbevise din sjef om at dette kurset er perfekt for deg.
Det eneste du trenger å gjøre er å fylle ut kontaktinformasjon, så sender vi relevant informasjon om kurset rett til dine utvalgte kontaktpersoner.
Bruk gjerne funksjonen til å tipse venner og kollegaer om at dette er et nyttig kurs for dem





Kontakt oss

Business Manager Development

Henning Solberg

930 90 129

henning@glasspaper.no


Glasspaper er kåret til Årets Microsoft Kurspartner 2015 - 2014 - 2013 - 2012 - 2011 - 2010 - 2008!