.Net Secure Coding Camp | Attacking and Securing C# / ASP.Net Web Applications (TT8320-N)

Learn how to fortify your applications, stay ahead of emerging threats, and protect your organization from costly security breaches

TT8320-N

Intermediate

4 Days

Course Overview

Overview

Discover the cutting-edge of cybersecurity and elevate your skills as a .NET developer with our comprehensive Bug Hunting and Application Security course. Designed specifically for experienced .NET developers, our .Net Secure Coding Camp |  Attacking and Securing C# / ASP .Net Web (Core) Applications is an immersive, hands-on training program that delves deep into the world of bug hunting, ethical hacking, and web application security. Through real-world case studies, engaging labs, and expert instruction, you'll gain the knowledge and skills needed to fortify your applications, stay ahead of emerging threats, and protect your organization from costly security breaches.

Upon completing this course, you will not only acquire a profound understanding of application security concepts and best practices but also enhance your problem-solving, debugging, and overall software development prowess. Empowered with these new skills, you'll be well-prepared to identify, address, and prevent security threats in your .NET applications, ensuring a robust and secure digital environment for your organization.

NOTE: PCI Compliant Developer Training:  This secure coding training addresses common coding vulnerabilities in software development processes. This training is used by one of the principal participants in the PCI DSS. Having passed multiple PCI audits, this course has been shown to meet the PCI requirements.  The specifications of those training requirements are detailed in 6.5.1 through 6.5.7 on pages 60 through 65 of the PCI DSS Requirements 3.2.1 document.

Learning Objectives

With a strong focus on real-world case studies and labs, this course will sharpen your ability to identify, analyze, and resolve security issues in their applications.  

Working in a lab-intensive, hands-on coding environment students will explore:

  • Understanding Cybersecurity Concepts: Gain a solid foundation in cybersecurity principles, the evolving threat landscape, and the language of the industry to better identify and address security issues in .NET applications.
  • Ethical Bug Hunting Techniques: Learn safe and appropriate methods for hunting bugs, ensuring responsible and ethical practices while working to uncover and address vulnerabilities in your applications.
  • Web Application Security: Master the skills required to analyze, identify, and mitigate vulnerabilities in web applications, following best practices and guidelines from organizations such as OWASP, WASC, CWE, and CERT Secure Coding Standard.
  • Utilizing Industry-Standard Tools and Frameworks: Acquire hands-on experience with widely used tools and frameworks, such as Visual Studio and .NET Cryptography, to effectively and efficiently secure your applications.
  • Improved Problem Solving and Debugging: Enhance your ability to identify, analyze, and resolve security issues in your applications through real-world case studies, labs, and expert instruction.
  • Defensive Programming Techniques: Learn and apply defensive programming techniques like securing trust boundaries, input validation, and proper exception handling to create more robust and secure .NET applications.
  • Cryptography in .NET: Develop a deep understanding of .NET cryptographic services, hash algorithms, symmetric and asymmetric encryption, and gain hands-on experience with a cryptography wrapper for .NET.
  • Secure Software Development Processes: Gain insight into secure software development processes, including the concept of "shifting left" and the implementation of secure design principles, enabling you to create safer and more reliable .NET applications.

Course Objectives

Learning Objectives

With a strong focus on real-world case studies and labs, this course will sharpen your ability to identify, analyze, and resolve security issues in their applications.  

Working in a lab-intensive, hands-on coding environment students will explore:

  • Understanding Cybersecurity Concepts: Gain a solid foundation in cybersecurity principles, the evolving threat landscape, and the language of the industry to better identify and address security issues in .NET applications.
  • Ethical Bug Hunting Techniques: Learn safe and appropriate methods for hunting bugs, ensuring responsible and ethical practices while working to uncover and address vulnerabilities in your applications.
  • Web Application Security: Master the skills required to analyze, identify, and mitigate vulnerabilities in web applications, following best practices and guidelines from organizations such as OWASP, WASC, CWE, and CERT Secure Coding Standard.
  • Utilizing Industry-Standard Tools and Frameworks: Acquire hands-on experience with widely used tools and frameworks, such as Visual Studio and .NET Cryptography, to effectively and efficiently secure your applications.
  • Improved Problem Solving and Debugging: Enhance your ability to identify, analyze, and resolve security issues in your applications through real-world case studies, labs, and expert instruction.
  • Defensive Programming Techniques: Learn and apply defensive programming techniques like securing trust boundaries, input validation, and proper exception handling to create more robust and secure .NET applications.
  • Cryptography in .NET: Develop a deep understanding of .NET cryptographic services, hash algorithms, symmetric and asymmetric encryption, and gain hands-on experience with a cryptography wrapper for .NET.
  • Secure Software Development Processes: Gain insight into secure software development processes, including the concept of "shifting left" and the implementation of secure design principles, enabling you to create safer and more reliable .NET applications.

Course Prerequisites

Audience & Pre-Requisites

This is an intermediate level .Net programming course, designed for experienced .NET developers, software engineers, and architects who are seeking to enhance their knowledge and skills in application security, bug hunting, and secure software development.  The course would also be well-suited for IT professionals, such as security analysts, security engineers, and DevOps team members, who are responsible for ensuring the security and integrity of web applications in their organizations.

Take Before:  Incoming students should have skills equivalent to the topics in, or should have recently attended, this course as a pre-reqisuite:

  • TTCN20483 Introduction to Programming in C# | Creating Apps in C# and .Net Core (20483) 

Next Steps / Follow-on Courses: We offer a wide variety of follow-on courses for next-level application security and cybersecurity skills, programming, design and more. Please see our Cybersecurity Learning Paths for options based on your specific role and goals. 

 

Related Courses

The following are a subset of our related Cybersecurity courses. Please see our website catalog for the complete list of courses and learning paths.

  • TT8120          Introduction to Securing Web Applications (2 days)
  • TT8600          Secure Software Design (4 days)
  • TT8700          Securing Databases (2 days)

Course Agenda

 

Course Topics / Agenda

Please note that this list of topics is based on our standard course offering, evolved from typical industry uses and trends. We will work with you to tune this course and level of coverage to target the skills you need most. Course agenda, topics and labs are subject to adjust during live delivery in response to student skill level, interests and participation.

 

Session: Bug Hunting Foundation

  1. Why Hunt Bugs?
  • The Language of Cybersecurity
  • The Changing Cybersecurity Landscape
  • AppSec Dissection of SolarWinds
  • The Human Perimeter
  • First Axiom in Web Application Security Analysis
  • First Axiom in Addressing ALL Security Concerns
  1. Safe and Appropriate Bug Hunting/Hacking
  • Warning to All Bug Hunters
  • Working Ethically
  • Respecting Privacy
  • Bug/Defect Notification
  • Bug Hunting Pitfalls

Session: Scanning Web Applications

  1. Scanning Applications Overview
  • Scanning Beyond the Applications
  • Fingerprinting
  • Vulnerability Scanning: Hunting for Bugs
  • Reconnaissance Goals
  • Data Collection Techniques
  • Fingerprinting the Environment
  • Enumerating the Web Application

Session: Moving Forward from Hunting Bugs

  1. Removing Bugs
  • Open Web Application Security Project (OWASP)
  • OWASP Top Ten Overview
  • Web Application Security Consortium (WASC)
  • Common Weaknesses Enumeration (CWE)
  • CERT Secure Coding Standard
  • Microsoft Security Response Center
  • Software-Specific Threat Intelligence

Session: Bug Stomping 101

  1. Unvalidated Data
  • CWE-787, 125, 20, 416, 434, 190, 476 and 119
  • Potential Consequences
  • Defining and Defending Trust Boundaries
  • Rigorous, Positive Specifications
  • Allow Listing vs Deny Listing
  • Challenges: Free-Form Text, Email Addresses, and Uploaded Files
  1. A01: Broken Access Control
  • CWE-22, 352, 862, 276, and 732
  • Elevation of Privileges
  • Insufficient Flow Control
  • Unprotected URL/Resource Access/Forceful Browsing
  • Metadata Manipulation (Session Cookies and JWTs)
  • Understanding and Defending Against CSRF
  • CORS Misconfiguration Issues
  1. A02: Cryptographic Failures
  • CWE-200
  • Identifying Protection Needs
  • Evolving Privacy Considerations
  • Options for Protecting Data
  • Transport/Message Level Security
  • Weak Cryptographic Processing
  • Keys and Key Management
  • NIST Recommendations
  1. A03: Injection
  • CWE-79, 78, 89, and 77
  • Pattern for All Injection Flaws
  • Misconceptions With SQL Injection Defenses
  • Drill Down on Stored Procedures
  • Other Forms of Server-Side Injection
  • Minimizing Server-Side Injection Flaws
  • Client-side Injection: XSS
  • Persistent, Reflective, and DOM-Based XSS
  • Best Practices for Untrusted Data
  1. A04: Insecure Design
  • Secure Software Development Processes
  • Shifting Left
  • Principles for Securing All Designs
  • Leveraging Common AppSec Practices and Control
  • Paralysis by Analysis
  • Actionable Application Security
  • Additional Tools for the Toolbox
  1. A05: Security Misconfiguration
  • System Hardening: IA Mitigation
  • Risks with Internet-Connected Resources
  • Minimalist Configurations
  • Application Allow Listing
  • Secure Baseline
  • Segmentation with Containers and Cloud
  • CWE-611
  • Safe XML Processing

Session: Bug Stomping 102

  1. A06: Vulnerable and Outdated Components
  • Problems with Vulnerable Components
  • Software Inventory
  • Managing Updates: Balancing Risk and Timeliness
  • Virtual Patching
  • Dissection of Ongoing Exploits
  1. A07: Identification and Authentication Failures
  • CWE-306, 287, 798 and 522
  • Quality and Protection of Authentication Data
  • Anti-Automation Defenses
  • Multifactor Authentication
  • Proper Hashing of Passwords
  • Handling Passwords on Server Side
  1. A08: Software and Data Integrity Failures
  • CWE-502
  • Software Integrity Issues and Defenses
  • Using Trusted Repositories
  • CI/CD Pipeline Issues
  • Protecting Software Development Resources
  • Serialization/Deserialization
  1. A09: Security Logging and Monitoring Failures
  • Detecting Threats and Active Attacks
  • Best Practices for Logging and Logs
  • Safe Logging in Support of Forensics
  1. A10: Server Side Request Forgeries (SSRF)
  • CWE-918
  • Understanding SSRF
  • Remote Resource Access Scenarios
  • Complexity of Cloud Services
  • SSRF Defense in Depth
  • Positive Allow Lists

Session: Moving Forward with Application Security

  1. Applications: What Next?
  • Common Vulnerabilities and Exposures
  • CWE Top 25 Most Dangerous SW Errors
  • Strength Training: Project Teams/Developers
  • Strength Training: IT Organizations
  1. .NET Issues and Best Practices
  • Managed Code and Buffer Overflows
  • .Net Permissions
  • ActiveX Controls
  • Proper Exception Handling

Session: Exploring .Net Cryptography

  1. .Net Cryptographic Services
  • The role of cryptographic services
  • Hash algorithms and hash codes
  • Encrypting data symmetrically
  • Encrypting data asymmetrically

Course Materials

Student Materials & Lab Environment

All course software (limited versions, for course use only), digital courseware files or course notes, labs / data sets and solutions (as applicable) are provided for you in our “easy access / no install required” high-speed remote lab environment. Our tech team works with every student to ensure everyone is set up with working access and ready to go prior to every course start date, ensuring a smooth course delivery and great hands-on experience.

For More Information

For more information about our dedicated skills-focused training services (instructor-led, self-paced or blended), collaborative coaching services, robust Learning Experience Platform (LXP) solutions, Career Experiences, public course schedule, partner programs, courseware licensing options or to see our complete list of course offerings, training solutions and special offers please visit us at www.triveratech.com, email Info@triveratech.com or call us toll free at 844-475-4559. Our pricing and services are always satisfaction guaranteed.

Raise the bar for advancing technology skills

Attend a Class!

Live scheduled classes are listed below or browse our full course catalog anytime

Special Offers

We regulary offer discounts for individuals, groups and corporate teams. Contact us

Custom Team Training

Check out custom training solutions planned around your unique needs and skills.

EveryCourse Extras

Exclusive materials, ongoing support and a free live course refresh with every class.

Attend a Course

Please see the current upcoming available open enrollment course dates posted below. Please feel free to Register Online below, or call 844-475-4559 toll free to connect with our Registrar for assistance. If you need additional date options, please contact us for scheduling.

Course Title Days Date Time Price
.Net Secure Coding Camp | Attacking and Securing C# / ASP.Net Web Applications (TT8320-N) 4 Days Dec 16 to Dec 19 10:00 AM to 06:00 PM EST $2,595.00 Enroll
.Net Secure Coding Camp | Attacking and Securing C# / ASP.Net Web Applications (TT8320-N) 4 Days Feb 3 to Feb 6 10:00 AM to 06:00 PM EST $2,595.00 Enroll
.Net Secure Coding Camp | Attacking and Securing C# / ASP.Net Web Applications (TT8320-N) 4 Days Apr 14 to Apr 17 10:00 AM to 06:00 PM EST $2,595.00 Enroll
.Net Secure Coding Camp | Attacking and Securing C# / ASP.Net Web Applications (TT8320-N) 4 Days Jun 23 to Jun 26 10:00 AM to 06:00 PM EST $2,595.00 Enroll
.Net Secure Coding Camp | Attacking and Securing C# / ASP.Net Web Applications (TT8320-N) 4 Days Aug 25 to Aug 28 10:00 AM to 06:00 PM EST $2,595.00 Enroll

Mix, Match & Master!
2FOR1: Two Courses, One Price!

Enroll in *any* two public courses (for 2023 *OR* 2024 dates!) by December 31, for one price!  Learn something new, or share the promo!

Click for Details & Additional Offers

Learn. Explore. Advance!

Extend your training investment! Recorded sessions, free re-sits and after course support included with Every Course
Trivera MiniCamps
Gain the skills you need with less time in the classroom with our short course, live-online hands-on events
Trivera QuickSkills: Free Courses and Webinars
Training on us! Keep your skills current with free live events, courses & webinars
Trivera AfterCourse: Coaching and Support
Expert level after-training support to help organizations put new training skills into practice on the job

The voices of our customers speak volumes

Special Offers
Limited Offer for most courses.

SAVE 50%

Learn More