fbpx
cybersecurity
education
€ EUR
  • $ USD
  • € EUR
  • #course
  • #livevirtualclass

Secure Coding Techniques .NET

Live Virtual Class - Super Intensive Remote Training with Labs!
Days
Hours
Min.
Sec.

During this 3-day course in 21 hours of super intensive training you will gain crucial cybersecurity knowledge and skills in terms of Secure Coding Techniques .NET. Moreover, you will be able to:

    • Get the highest quality and unique learning experience – the class is limited to 10 participants by default.
    • Get the opportunity to interact with our world-renowned Experts.
    • Go through CQURE’s custom lab exercises and practice them after the course.
    • Receive a lifelong certification after completing the course!

 

(9:00am – 4:00pm CEST/CET Monday to Friday)

Contact us for more details.

2575

Why this course?

This is an international Live Virtual Class where you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office! The class is taught fully remotely in English by CQURE Cybersecurity Experts. In order to ensure the highest quality and unique learning experience, the course is limited to 12 participants by default, or supported by an assistant instructor if the number of delegates exceeds 12. During this course, you will have the opportunity to go through CQURE’s custom lab exercises, interact with our world-renowned Expert and receive a lifelong certification after completing the course!

This is an international Live Virtual Class where you will be able to share the learning experience with a group of IT pros from around the world without leaving your home or office! The class is taught fully remotely in English by CQURE Cybersecurity Experts. In order to ensure the highest quality and unique learning experience, the course is limited to 12 participants by default, or supported by an assistant instructor if the number of delegates exceeds 12. During this course, you will have the opportunity to go through CQURE’s custom lab exercises, interact with our world-renowned Expert and receive a lifelong certification after completing the course!

Pricing plan

We offer you pricing plan designed and adjusted to your specific needs and budget. Buy now or book your spot and pay later.

Course timeline

  • 1. Before the course

    You will receive a Student Guide with instruction on how to prepare for the training, information regarding all the technical requirements and your own individual login credentials to the virtual environment.

  • 2. During the course

    You will be able to exercise and review all learned content on an ongoing basis.

  • 3. After the course

    You will receive a Certificate of Completion, all the materials which have been created and presented by the trainer as well as an access to our community on the Discord server.

Course benefits

How our lessons look like

  • Loads of Knowledge
  • Implementation workshop
  • Course materials
  • Unique exercises
  • Social & Network
  • Certification

Loads of Knowledge

During 3-day instructor-led training you will learn and practice all important .NET security features (with special focus on web applications), ways of hacking applications and reviewing the code with security in mind. We will start by talking about security as a process – covering most important aspects of latest Microsoft SDL guidance, tools, architecture and design practices. Then we will go through everything that each .NET developer needs to know about secure coding practices with newest tools and services (Visual Studio 2017, TFS 2018 or Azure DevOps).

Implementation workshop

We will spend most of our time talking about securing ASP.NET applications and issues frequently observed. You will learn about OWASP TOP 10 – most critical web application security vulnerabilities, see them in practice (in ASP.NET) and mitigate the risks. We will see how to hack web applications by using various techniques and learn how to prevent those risks. You will learn about the latest version of ASP.NET Identity – modern framework for securing ASP.NET applications. We will cover fundamentals of ASP.NET Web API and see modern ways of protecting them by OAUTH 2, OpenID and claims-based authentication. At the end you will see how to put all the knowledge in practice to conduct code reviews. After finishing the course, attendees will be up-to date with the latest security techniques used in .NET applications and will be able to conduct .NET application code reviews by themselves.

Course materials

During the course you will be provided with a bunch of materials such as lab exercises, presentations, intriguing articles and useful tools to make your tasks a little bit easier!

Unique exercises

All exercises are based on Windows Server, Windows 10 and Kali Linux. This course is based on practical knowledge from tons of successful projects, many years of real-world experience and no mercy for misconfigurations or insecure solutions! Remember that the labs will stay online for an extra three weeks so you may practice even more after the training is completed!

Social & Network

You will be granted access to our closed Discord community server where you will be able to share your thoughts with other IT specialists.

Certification

After finishing the course, you will be granted a CQURE Certificate of Completion. Please note that after completing the course you will also be eligible for CPE points!

Course syllabus

This Live Virtual Class consists of 8 Modules in terms of Secure Coding Techniques .NET. They include essential theory combined with individual practice during the exercises as well as loads of hands-on tools and real-case scenarios.

  • Module 1: Security as a process

    • 1. Microsoft Security Development Lifecycle fundamentals
    • 2. Threat modeling
    • 1. Code Access Security and other security features in .NET 4.8
    • 2. Security features of .Net Core
    • 3. Encryption
    • 4. Protecting data
    • 5. Obfuscation
    • 6. Secure coding guidelines
  • Module 3: General web application security issues

    • 1. OWASP Top 10 by example
    • 2. Hacking your web application
  • Module 4: SQL Security

    • 1. SQL Server security features
    • 2. Security and encryption in SQL Server 2019
  • Module 5: ASP.NET Security Features

    • 1. ASP.NET MVC security
    • 2. Web Forms security
    • 3. ASP.NET Identity
  • Module 6: Securing Web APIs

    • 1. ASP.NET Web API 2 fundamentals, OWIN Exploit Guard (ASR)
    • 2. Web API Security
    • 3. OAUTH 2, OpenID Connect
  • Module 7: Secure Web API Clients

    • 1. Fundamentals and security of AngularJS applications
    • 2. Mobile applications security
    • 3. OAUTH 2, OpenID Connect
  • Module 8: Code reviews

    • 1. Conducting a code review - in practice
    • 2. Security checklists
    • 3. Code reviews - lessons learned
    • 4. Working with Azure DevOps

Who is it for?

Audience

The course is perfect for enterprise administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants.

Platform and Technical Requirements

To participate in the course you need a stable internet connection. For best learning experience we also need you to have a webcam, headphones and a microphone. Open RDP port 3391 for the connection to the Lab environment is needed as well. We will setup a secure Zoom classroom for every day of the course – we will send you a safe link to join the conference by e-mail.

Exercises

All the exercises are based on Windows Server 2016 and 2019, Windows 10 and Kali Linux.

How to persuade your manager that this course is meaningful?

Investing in knowledge is one of the most worthy investment not only for us, but also for our environment. Learning new skills and insights in terms of cybersecurity may benefit with gaining awareness and as a result, may prevent falling a victim to cyber threats in the future.

Protects the Company

You will be the valuable element in regards to company’s safety – knowing about potential threats and ways of avoiding them may be incredibly useful in a daily company life.

Improves Employees skills

Not only your company will gain a specialist in terms of cybersecurity, but also you will unlock the door for expanding your skills horizon even further.

Boosts customer confidence

Completed course with personal certification may be the perfect advantage when it comes to business.

Helps comply with regulations

Knowledge is power — it helps navigate through complex regulatory landscapes. Keeping up-to-date with the latest cybersecurity regulations and standards ensures your company remains compliant, thus avoiding costly penalties and reputational damage.

Saves money in the long run

Who would have want to pay regularly for help in case of emergency data leakage in a company? It’s much better to educate the employees and prevent any cybersecurity risks.

Prepares for emerging threats

After our course, you will be educated in the possible threats and you will identify any suspicious activity online with ease.

Register now and learn from the best!

During this 21-hour super intensive training you will gain crucial cybersecurity knowledge and skills in terms of hacking and securing Windows infrastructure. Moreover, you will be able to:

  • Get the highest quality and unique learning experience.
  • Get the opportunity to interact with our world-renowned Experts.
  • Go through CQURE’s custom lab exercises and practice them after the course.

Your Experts

This course is delivered by one of the greatest, world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills and no mercy for misconfigurations or insecure solutions.

Ronald

Harmsen

MCT, Solution & Software Architect, Developer

Solution architect, trainer, and speaker based in the Netherland. He has been active in professional software development since the mid-90s. He mainly works with technologies like Microsoft Azure, Kubernetes and software development in dotnet, building IoT and microservice-based cloud-first systems.

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form