Information Assurance (STIG) Overview (TT8800)

Explore best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs

TT8800

Intermediate

2 Days

Course Overview

Overview

The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.

The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instructors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.

The next half  delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You’ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.

Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You’ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges.

Note: For a deeper (or next-step) exploration of STIGs and Application Security attendees might consider the five-day course TT8815: Understanding and Verifying ASD STIGs

Learning Objectives

Working in an interactive learning environment, guided by our application security expert, you’ll explore:

  • the concepts and terminology behind defensive coding
  • Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets
  • the entire spectrum of threats and attacks that take place against software applications in today’s world
  • the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications
  • the vulnerabilities of programming languages as well as how to harden installations
  • the basics of Cryptography and Encryption and where they fit in the overall security picture
  • the requirements and best practices for program management as specified in the STIGS
  • the processes and measures associated with the Secure Software Development (SSD)
  • the basics of security testing and planning

Information Assurance Overview (STIG) is an essential course for technical leads, project managers, testing/QA personnel and other stakeholders who need to understand the issues and concepts associated with secure applications.  During this one-day dynamic seminar, students learn the best practices for designing , implementing, and deploying secure applications as prescribed in the various STIGS.  

Students who attend Information Assurance Overview will leave the course armed with the required skills to understand software vulnerabilities (actual and potential) and defenses for those vulnerabilities.  This course quickly introduces students to the various types of threats against their software and provides coverage of many core security-related technologies.  The concept and process of Threat Modeling is introduced as a key enabler for implementing effective and appropriate security for software and information assets.

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) web application, developers are ready to learn how to build secure web applications starting at project inception. The final portion of this course builds on the previously learned mechanics for building defenses by exploring how design and analysis can be used to build stronger applications from the beginning of the software lifecycle.

A key component to our coverage of DISA’s Security Technical Implementation Guides (STIGS), this course is a companion course with several developer-oriented courses and seminars.

Course Objectives

Learning Objectives

Working in an interactive learning environment, guided by our application security expert, you’ll explore:

  • the concepts and terminology behind defensive coding
  • Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets
  • the entire spectrum of threats and attacks that take place against software applications in today’s world
  • the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications
  • the vulnerabilities of programming languages as well as how to harden installations
  • the basics of Cryptography and Encryption and where they fit in the overall security picture
  • the requirements and best practices for program management as specified in the STIGS
  • the processes and measures associated with the Secure Software Development (SSD)
  • the basics of security testing and planning
  • Understand the concepts and terminology behind defensive coding
  • Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets
  • Learn the entire spectrum of threats and attacks that take place against software applications in today’s world
  • Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications
  • Understand the vulnerabilities of programming language as well as how to harden installations
  • Understand the basics of Cryptography and Encryption and where they fit in the overall security picture
  • Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena
  • Understand the requirements and best practices for program management as specified in the STIGS
  • Understand the processes and measures associated with the Secure Software Development (SSD)
  • Understand the basics of security testing and planning

Need different skills or topics?  If your team requires different topics or tools, additional skills or custom approach, this course may be further adjusted to accommodate.  We offer additional STIG, application security, secure coding, secure software development, hacking, database security, bug hunting and other related topics that may be blended with this course for a track that best suits your needs. Our team will collaborate with you to understand your needs and will target the course to focus on your specific learning objectives and goals.

Course Prerequisites

Audience

The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as:

  • IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications.
  • Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process.
  • Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams.
  • Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices.
  • Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle.
  • Testing/QA personnel - Quality assurance analysts and testers who verify the security, functionality, and performance of web applications before deployment.
  • Other key stakeholders - IT managers, CISOs, and decision-makers who need to understand the importance of secure applications and the principles of Information Assurance and STIGs to make informed decisions regarding their organization's cybersecurity posture.

Pre-Requisites

While specific prerequisites may vary depending on the course provider and the targeted audience, a general set of prerequisites for attending a course on Information Assurance and STIGs could include:

  • Basic understanding of information security concepts and terminology.
  • Familiarity with web application architecture and development.
  • Knowledge of networking and web protocols (e.g., HTTP, HTTPS, TCP/IP).
  • Experience with programming languages commonly used in web application development, such as JavaScript, Python, Java, or C# would be helpful but not required, as this is not a hands-on class
  • A general understanding of operating systems, databases, and web servers

Course Agenda

Session: STIG Foundation

Lesson: DISA's Security Technical Implementation Guides (STIGs)

  • The motivations behind STIGs
  • Requirements that the various software development roles must meet
  • Implementing STIG requirements and guidelines

Lesson: Why Hunt Bugs?

  • The Language of CyberSecurity
  • The Changing Cybersecurity Landscape
  • AppSec Dissection of SolarWinds
  • The Human Perimeter
  • Interpreting the 2021 Verizon Data Breach Investigation Report
  • First Axiom in Web Application Security Analysis
  • First Axiom in Addressing ALL Security Concerns
  • Lab: Case Study in Failure

Lesson: Safe and Appropriate Bug Hunting/Hacking

  • Working Ethically
  • Respecting Privacy
  • Bug/Defect Notification
  • Bug Bounty Programs
  • Bug Hunting Mistakes to Avoid

Session: Foundation for Securing Web Applications

Lesson: Principles of Information Security

  • Secuity Is a Lifecycle Issue
  • Minimize Attack Surface Area
  • Layers of Defense: Tenacious D
  • Compartmentalize
  • Consider All Application States
  • Do NOT Trust the Untrusted

Lesson: Identification and Authentication Failures

  • Applicable STIGs
  • Quality and Protection of Authentication Data
  • Proper hashing of passwords
  • Handling Passwords on Server Side
  • Session Management
  • HttpOnly and Security Headers
  • Lab: STIG Walk-Throughs

Lesson: Injection

  • Applicable STIGs
  • Injection Flaws
  • SQL Injection Attacks Evolve
  • Drill Down on Stored Procedures
  • Other Forms of Server-Side Injection
  • Minimizing Injection Flaws
  • Client-side Injection: XSS
  • Persistent, Reflective, and DOM-Based XSS
  • Best Practices for Untrusted Data
  • Lab: STIG Walk-Throughs

Session: Moving Forward

Lesson: Applications: What Next?

  • Common Vulnerabilities and Exposures
  • CWE/SANS Top 25 Most Dangerous SW Errors
  • Strength Training: Project Teams/Developers
  • Strength Training: IT Organizations

Lesson: Cryptographic Failures

  • Applicable STIGs
  • Identifying Protection Needs
  • Evolving Privacy Considerations
  • Options for Protecting Data
  • Transport/Message Level Security
  • Weak Cryptographic Processing
  • Keys and Key Management
  • Threats of Quantum Computing
  • Steal Now, Crack Later Threat
  • Lab: STIG Walk-Throughs

Session: Moving Forward with Application Security

Lesson: Application Security and Development Checklists

  • Checklist Overview, Conventions, and Best Practices
  • Leveraging Common AppSec Practices and Control
  • Actionable Application Security
  • Additional Tools for the Toolbox
  • Strength Training: Project Teams/Developers
  • Strength Training: IT Organizations
  • Lab: Recent Incidents

Time Permitting

Session: Secure Development Lifecycle (SDL)

Lesson: SDL Overview

  • Attack Phases: Offensive Actions and Defensive Controls
  • Secure Software Development Processes
  • Shifting Left
  • Actionable Items Moving Forward
  • Lab: Design Study Review

Session: Taking Action Now

Lesson: Asset Analysis

  • Asset Analysis Process
  • Types of Application-Related Assets
  • Adding Risk Escalators
  • Discovery and Recon

Lesson: Design Review

  • Asset Inventory and Design
  • Assets, Dataflows, and Trust Boundaries
  • Risk Escalators in Designs
  • Risk Mitigation Options

Course Materials

Setup Made Simple with our robust Learning Experience Platform (LXP)

All course software (limited versions, for course use only), knowledge checks, digital courseware files or course notes, labs / data sets and solutions, live coaching support channels (as applicable) and rich extended learning / post training resources are provided for you in our “easy access / no install required” high-speed Learning Experience Platform (LXP) remote lab and content environment. Our tech team works with every student to ensure everyone is set up with working access and ready to go prior to every course start date, ensuring a smooth delivery and great hands-on experience.

Every-Course Extras = High-Value & Long-Term Learning Support!

All Public Schedule courses include our unique EveryCourse Extras package (Course Recordings, Live Instructor Follow-on Support, Free *Live* Course Refresh Re-Takes, early access to Special Offers, Free Courses & more). Please inquire for details.

Classroom Setup Made Simple:  Our dedicated tech team will work with you to ensure your classroom and lab environment is setup, tested and ready to go well in advance of the course delivery date, ensuring a smooth start to class and seamless hands-on experience for your students. We offer several flexible student machine setup options including guided manual set up for simple installation directly on student machines, or cloud based / remote hosted lab solutions where students can log in to a complete separate lab environment minus any installations, or we can supply complete turn-key, pre-loaded equipment to bring ready-to-go student machines to your facility.  Please inquire for details, options and pricing.

Raise the bar for advancing technology skills

Attend a Class!

Live scheduled classes are listed below or browse our full course catalog anytime

Special Offers

We regulary offer discounts for individuals, groups and corporate teams. Contact us

Custom Team Training

Check out custom training solutions planned around your unique needs and skills.

EveryCourse Extras

Exclusive materials, ongoing support and a free live course refresh with every class.

Attend a Course

Please see the current upcoming available open enrollment course dates posted below. Please feel free to Register Online below, or call 844-475-4559 toll free to connect with our Registrar for assistance. If you need additional date options, please contact us for scheduling.

Course Title Days Date Time Price
Information Assurance (STIG) Overview (TT8800) 2 Days Aug 21 to Aug 22 10:00 AM to 06:00 PM EST $1,995.00 Enroll

Learning is Twice as Nice!
Buy One Get One Free!

Enroll by May 31 in any TWO public classes in 2023 for the price of ONE! 

Click for Details & Additional Offers

Learn. Explore. Advance!

Extend your training investment! Recorded sessions, free re-sits and after course support included with Every Course
Trivera MiniCamps
Gain the skills you need with less time in the classroom with our short course, live-online hands-on events
Trivera QuickSkills: Free Courses and Webinars
Training on us! Keep your skills current with free live events, courses & webinars
Trivera AfterCourse: Coaching and Support
Expert level after-training support to help organizations put new training skills into practice on the job

The voices of our customers speak volumes

Special Offers
Limited Offer for most courses.

SAVE 50%

Learn More