Cybersecurity Training

Cybersecurity Training

Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cybersecurity. According to a December 2010 analysis of U.S. spending plans, the federal government has allotted over $13 billion annually to cybersecurity over the next five years.

Read More

Ensuring cybersecurity requires coordinated efforts throughout an information system. Elements of cybersecurity include: One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks. The traditional approach has been to focus most resources on the most crucial system components and protect against the biggest known threats, which necessitated leaving some less important system components undefended and some less dangerous risks not protected against. Such an approach is insufficient in the current environment. Adam Vincent, CTO-public sector at Layer 7 Technologies (a security services provider to federal agencies including Defense Department organizations), describes the problem: "The threat is advancing quicker than we can keep up with it. The threat changes faster than our idea of the risk. It's no longer possible to write a large white paper about the risk to a particular system. You would be rewriting the white paper constantly..." To deal with the current environment, advisory organizations are promoting a more proactive and adaptive approach. The National Institute of Standards and Technology (NIST), for example, recently issued updated guidelines in its risk assessment framework that recommended a shift toward continuous monitoring and real-time assessments.

Foundational Courses

  1. EC Council Secure Computer User Specialist
  2. CyberSAFE (Securing Assets For End-Users)
  3. CyberSec First Responder: Threat Detection and Response

Advance Courses

  1. CompTIA Security
  2. Certified Ethical Hacker v9
  3. Certified Information Security Systems Professional (CISSP)
  4. EC Council Security Analyst (ECSA) v9 Training
  5. EC-Council Certified Secure Programmer .NET (ECSP

EC Council Secure Computer User Specialist

About This Course

The purpose of the SCUS training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering.  More importantly, the skills learnt from the class helps students take the necessary steps to mitigate their security exposure.

Who Should Attend

  • This course is specifically designed for todays’ computer user who uses the internet and the www extensively to work, study and play.
  • This certification is an excellent complement to educational offerings in the domain of security and networking.
  • Educational institutions can provide greater value to students by providing them not only with one of the most updated courseware available today but with a certification that empower their students in the corporate world. The courseware comes complete with labs and exercises to allow the student to gain actual skills.
Enquire For Price & Details

 

Foundational Courses

1. Secure Computer User Specialist (SCUS) Course Outline

SCUS Module 01: Foundations of Security

  • Security Incident Occurrences Over Time
  • Security Incidents by Breach Type – 2011
  • Essential Terminologies
  • Computer Security
  • Why Security?
  • Potential Losses Due to Security Attacks
  • Elements of Security
  • The Security, Functionality, and Ease of Use Triangle
  • Fundamental Concepts of Security
  • Layers of Security
  • Security Risks to Home Users
  • What to Secure?
  • What Makes a Home Computer Vulnerable?
  • What Makes a System Secure?
  • Benefits of Computer Security Awareness
  • Basic Computer Security Checklist

SCUS Module 02: Securing Operating Systems

  • System Security
  • Threats to System Security
    • Password Cracking
  • How Does Malware Propagate?
  • Guidelines for Windows OS Security
    • Lock the System When Not in Use
    • Create a Strong User Password
    • Change Windows User Password: Windows 7
    • Disable the Guest Account: Windows 7
    • Lock Out Unwanted Guests in Windows 7
    • Rename the Administrator Account in Windows 7
    • Disable Start up Menu in Windows 7
    • Windows Updates in Windows 7
    • Pointers for Updates
    • Apply Software Security Patches
    • Configuring Windows Firewall in Windows 7
    • Adding New Programs in Windows Firewall in Windows 7
    • Removing/Disabling Programs Rules from the Windows Firewall in Windows 7
    • Creating a New Windows Firewall Rule in Windows 7
    • Two-Way Firewall Protection in Windows
    • Always Use NTFS
  • Windows Encrypting File System (EFS)
    • How to Decrypt a File Using EFS in Windows?
    • Using Windows Defender
    • Enable BitLocker in Windows 7
    • Launching Event Viewer in Windows 7
    • Event Viewer: Events and How to Read Logs on the System
    • Disabling Unnecessary Services in Windows 7
    • Killing Unwanted Processes
    • Finding Open Ports Using Netstat Tool
    • Configuring Audit Policy
    • How to Hide Files and Folders?
    • Disable Simple File Sharing in Windows
    • Raise the UAC Slider Bar in Windows 7
  • Windows Security Tools
    • Windows Security Tools: Microsoft Security Essentials
    • Windows Security Tools: KeePass Password Safe Portable
    • Windows Security Tools: Registry Mechanic
    • Windows Security Tools: Windows Defender
  • Guidelines for Securing Mac OS X
    • Step 1: Enabling and Locking Down the Login Window
    • Step 2: Configuring Accounts Preferences
    • Step 3: Guidelines for Creating Accounts
    • Step 4: Securing the Guest Account
    • Step 5: Controlling Local Accounts with Parental Controls
    • Step 6: Use Keychain Settings
    • Step 7: Use Apple Software Update
    • Step 8: Securing Date & Time Preferences
    • Step 9: Securing Network Preferences
    • Step 10: Enable Screen Saver Password
    • Step 11: Set Up FileVault to Keep Home Folder Secure
    • Step 12: Firewall Security
  • Resources on the Internet for Computer Security
  • Operating Systems Security Checklist
  • Windows 7 Security Checklist
  • MAC OS Security Checklist

SCUS Module 03: Protecting Systems Using Antiviruses

  • Introduction to Antivirus Software
    • The Most Dangerous Computer Viruses of All Time
    • Introduction to Antivirus Software
    • Need for Antivirus Program
  • How Does Antivirus Software Work?
    • Antivirus Software 2011
  • Choosing the Best Antivirus Software
  • Steps to Install Antivirus
    • Steps to Install Antivirus on Your Computer
    • How to Test if Antivirus is Working?
  • Configuring McAfee Antivirus
  • Configuring Kaspersky PURE
    • Configuring Kaspersky PURE: Backup and Restore
    • Configuring Kaspersky PURE: Computer Protection
    • Configuring Kaspersky PURE: Parental Control
    • Kaspersky PURE: Administrative Tools
  • Antivirus Security Checklist

SCUS Module 04: Data Encryption

  • Encryption
    • Common Terminologies
    • What Is Encryption?
    • Objectives of Encryption
    • Usage of Encryption
  • Types of Encryption
    • Symmetric vs. Asymmetric Encryption
  • Encryption Standards
  • Digital Certificates
    • How Digital Certificates Work
  • Digital Signature
  • How Digital Signature Works
  • Cryptography Tools
  • TrueCrypt
  • Cryptography Tools

SCUS Module 05: Data Backup and Disaster Recovery

  • Data Backup Introduction
    • Data Backup
    • Types of Data Loss
    • What Files to Backup and How Often?
    • Online Data Backup
    • Online Backup Service Providers
    • Types of Backup
  • Windows 7 Backup and Restore
    • Back Up the Data Using Windows Backup
    • Steps to Backup Data
    • Restoring Data
  • Data Encryption
    • Securing Backup on Storage Devices with Encryption
    • Data Encryption Tool: TrueCrypt
  • MAC OS X Backup and Restore
    • Time Machine (Apple Software)
    • Setting Up Time Machine
    • Restoring Files from Time Machine Backups
  • Data Backup Tools
    • Windows Data Backup Tool: Acronis True Image Home 2011
    • Windows Data Backup Tool: NovaBACKUP Home Protection
    • Data Backup Tools for Windows
    • MAC OS X Data Backup Tool: Data Backup
    • MAC OS X Data Backup Tool: SmartBackup
    • Data Backup Tools for MAC OS X
  • Data Recovery Tools
    • Windows Data Recovery Tool: Recover My Files
    • Windows Data Recovery Tool: EASEUS Data Recovery Wizard
    • Data Recovery Tools for Windows
    • MAC OS X Data Recovery Tool: Boomerang Data Recovery Software
    • MAC OS X Data Recovery Tool: VirtualLab
    • Data Recovery Tools for MAC OS X
  • Physical Security
    • Physical Security Measures: Locks
    • Physical Security Measures: Biometrics
    • Physical Security Measures: Fire Prevention
    • Physical Security Measures: HVAC Considerations
    • Securing Laptops from Theft
    • Laptop Theft Countermeasures
  • Data Backup Checklist
  • Physical Security Checklist

SCUS Module 06: Internet Security

  • Browser Security
    • Internet Security
    • Internet Explorer Security Settings
      • Internet Explorer Security Settings: Internet Zone
      • Internet Explorer Security Settings: ActiveX Controls
      • Internet Explorer Security Settings: Local Intranet Zone
      • Internet Explorer Security Settings: Trusted Sites Zone
      • Internet Explorer Security Settings: Restricted Zone
      • Understanding Cookies
      • Internet Explorer Privacy Settings
      • Deleting Browsing History
      • Do Not Allow the Browser to Remember any Password
      • Securing File Downloads
    • Mozilla Firefox: Security Settings
      • Mozilla Firefox: Privacy Settings
      • Securing File Downloads
      • Installing Plugins
    • Google Chrome Privacy and Security Settings
      • Google Chrome: Privacy Settings
      • Google Chrome: Security Settings
    • Apple Safari: Security Settings
    • Testing the Browser for Privacy
  • Search Engine and IM Security
    • Instant Messaging (IMing)
    • Instant Messaging Security Issues
    • Instant Messaging Security Measures
    • Searching on the Web
  • Online Games
    • Online Gaming and MMORPG
    • Online Gaming Risks
    • Insecure or Compromised Game Servers and Game Coding
    • Social Risks
    • Social Engineering
      • Message from a Gamer About a Password Stolen by a Malicious Program
      • Protection Schemes, Cyber Prostitution, and Virtual Mugging
    • How the Malicious Users Make Money
    • Security Practices Specific to Gaming
      • Recognize Administrator Mode Risks
      • Recognize Risks due to ActiveX and JavaScript
      • Play the Game, Only at the Game Site
      • Pay Attention to Firewall Management
  • Child Online Safety
    • Risks Involved Online
      • Misdirected Searches
      • Stealth Sites and Misleading URLs
      • Child Pornography, Grooming, and Cyberbullying
    • Role of the Internet in Child Pornography
    • Effects of Pornography on Children
    • Risks Involved in Social Networking Websites
    • Unsolicited Emails
    • Chat Rooms
    • Finding if Children are at Risk Online
    • Protecting Children from Online Threats
    • Encourage Children to Report
    • How to Report a Crime
    • Security Software for Protecting Children from Online Threats
      • KidZui
    • Actions To Take When the Child Becomes an Online Victim
  • Internet Laws
    • USA PATRIOT Act
    • Children’s Online Privacy Protection Act (COPPA)
    • The Digital Millennium Copyright Act
    • Highlights of DMCA
    • CAN-SPAM Act
    • Computer Misuse Act 1990
  • Internet Security Checklists
  • Checklist for Parents to Protect Their Child from Online Threats

SCUS Module 07: Securing Network Connections

  • Home and Wireless Networks
    • Home Network
      • Network Devices
      • Steps for Home Networking
    • Wireless Networks
  • Setting Up a Wireless Network
    • Setting Up a Wireless Network in Windows 7
    • Changing Wireless Networking Configuration in Windows 7
    • Setting Up a Wireless Network in Mac
    • Changing Wireless Networking Configuration in Mac
  • Wireless Network Security
    • Common Threats to Wireless Network
    • Securing Wireless Network
  • Using the Network with Windows 7
    • Setting Up the PC’s Name and Workgroup Name in Windows 7
    • Sharing
    • Transferring Files
    • Simple File Sharing in Windows 7
    • Hiding a Shared Disk or Folder
    • How to Share Printer in Windows 7?
    • Using Printers on Other PC’s
    • Accessing Files on Other PCs
    • Windows Easy Transfer
  • Using the Network with MAC OS X
    • Setting Up the PC’s Name in MAC OS X
    • Setting Up the Workgroup Name in MAC OS X
    • Creating User Accounts and Groups in MAC OS X
    • Sharing Files and Folders in Macintosh OS X
    • Printer Sharing in Macintosh OS X
    • Accessing Other Macs on Your Network
    • Network Security Threats
  • Securing Network Connections
    • Use Firewall
    • Use Antivirus Protection
    • Use Strong Passwords, Make Regular Backups, and Know about Encryption
    • Identify a Secure Website
    • General Security Practices for Home Networking
  • Network Adapters
    • Checking Network Adapter
    • Network Setup Wizard
    • How to Isolate Networking Problems (Windows 7): Network Adapter?
    • Network Adapter Status
  • Troubleshooting with Network Adapters
    • Network Adapter is Unplugged
    • Network Adapter Has Limited or No Connectivity
    • Network Adapter is Connected, but User Cannot Reach the Internet
  • Network Security Checklist

SCUS Module 08: Securing Online Transactions

  • Online Shopping
    • How Online Shopping Works?
  • Online Banking
  • Credit Card Payments
    • Types of Credit Card Frauds
    • Guidelines for Ensuring Credit Card Safety
  • Securing Online Transactions
    • Choosing a Secure Online Payment Service
    • Online Payment Services
  • SSL and the Padlock Symbol
    • What Does the SSL Show?
  • Identifying a Trustworthy Website
  • Identifying an Untrustworthy Website
  • McAfee’s SiteAdvisor
    • Rating Icons
  • Online Transactions Security Checklist

SCUS Module 09: Securing Email Communications

  • Introduction to Email Security
    • Email Threat Scenario 2011
    • How Various Email Systems Work?
    • Email Security
  • Email Security Threats
    • Malicious Email Attachments
      • Email Attachments: Caution
    • Spamming
      • Spamming Countermeasures
    • Anti-Spamming Tool: SPAMfighter
    • Hoax/Chain and Scam Emails
    • Nigerian Scam
  • Email Security Procedures
    • Email Security Control Layers
    • Email Security Procedures
      • Creating Strong Passwords
      • Alternate Email Address
      • Keep Me Signed In/Remember Me
      • Using HTTPS
      • Check for Last Account Activity
      • Scanning Email Attachments
      • Turn Off Preview Feature
      • Email Filtering: Avoiding Unwanted Emails
  • How to Obtain Digital Certificates?
    • Digitally Sign Your Emails
    • How to Obtain Digital Certificates?
    • Installing a Digital Certificate
    • Signing Your Emails
    • Microsoft Outlook Download Settings
  • Email Security Tools
    • Online Email Encryption Service: Lockbin
    • Email Security Tools
  • Email Communication Checklist
  • Email Security Checklist
  • Security Checklist for Checking Emails on Mobile

SCUS Module 10: Social Engineering and Identity Theft

  • Identity Theft Statistics 2011
  • Scenario
  • Identity Theft
    • What is Identity Theft?
    • Personal Information that Can be Stolen
    • How do Attackers Steal Identity?
    • What do Attackers do with Stolen Identity?
    • Identity Theft Example
  • Social Engineering
    • Social Engineering Example
    • Criminal as Phone Banker
    • Authority Support Example
    • Technical Support Example
    • Human-Based Social Engineering
    • Computer-Based Social Engineering
      • Computer-Based Social Engineering: Phishing
      • Phony Security Alerts
      • Computer-Based Social Engineering through Social Networking Websites
  • How to Find if You Are a Victim of Identity Theft
  • What to Do if Identity Is Stolen
  • Reporting Identity Theft
    • Federal Trade Commission
    • econsumer.gov
    • Internet Crime Complaint Center
    • Prosecuting Identity Theft
  • IP Hiding Tools
    • Hiding IP Address Using Quick Hide IP Tool
    • IP Address Hiding Tools
  • Identity Theft Protection Checklist
  • Computer Based Identity Theft Protection Checklist

SCUS Module 11: Security on Social Networking Sites

  • Introduction to Social Networking Sites
    • Social Networking Sites
    • What is a Profile?
    • Top Social Networking Sites
  • Social Networking Security Threats
    • Security Risks Involved in Social Networking Sites
      • Cyberbullying
      • Identity Theft
      • Phishing Scams
      • Malware Attacks
      • Site Flaws
      • Social Networking Threats to Minors
  • Staying Safe on Facebook
    • Facebook Privacy Settings
    • Profile Settings
    • Privacy Settings for Applications
    • Settings to Block Users
    • Recommended Actions for Facebook Search Settings
    • Facebook: Security Tips
  • Staying Safe on MySpace
    • Step 1: Go to “Account Settings”
    • Step 2: Check Settings for “Comments” and “Mail”
    • Step 3: Check Settings for “Friends Request” and “IM”
    • Step 4: Check Settings for Stream Settings
    • Step 5: Settings for Block Users By Age
  • Social Networking Security Checklist
  • Social Networking Security Checklist for Parents and Teachers

SCUS Module 12: Information Security and Legal Compliance

  • Health Insurance Portability and Accountability Act (HIPPA)
    • HIPAA Checklist
  • FERPA (Family Educational Rights and Privacy Act)
    • FERPA Checklist
  • PCI DSS (Payment Card Industry Data Security Standard )
    • PCI DSS Checklist

SCUS Module 13: Securing Mobile Devices

  • Introduction to Mobile Security
    • Mobile Device Security
    • Worldwide Smartphone Sales to End Users by Operating System in 2011  Market Shares
    • Mobile Phone Services
    • IMEI Number
  • Mobile Security Threats
    • Mobile Device Security Risks
    • Mobile Malware
    • Mobile Application Vulnerabilities
    • Threats to Bluetooth Devices
  • Mobile Security Procedure
    • Patching of Mobile Platforms and Applications
    • Avoid Mobile Device Theft
    • What to Do if Your Mobile is Lost or Stolen?
    • Use Power-on Authentication
    • Regularly Back Up Important Data
    • Use Encryption to Secure Data in Mobile Device
    • Enable Auto-Lock Feature
    • Install Only Signed Applications
    • Install Mobile Phone AntiVirus
    • Mobile Phone Anti-Virus Tools
    • Secure Bluetooth Connectivity
  • Securing iPhone and iPad
    • Enable Passcode Protection
    • Enable SIM PIN Protection
    • Enable Auto-Lock and Re-map Button
    • iPad Security
  • Securing BlackBerry and Windows 7 Mobile
    • BlackBerry: Setting Device Password
    • BlackBerry: Changing the Device Password
    • BlackBerry: Lock Your Device
    • BlackBerry: Device Password
    • BlackBerry Password Keeper
    • Encrypting Data on Your BlackBerry Device
    • Windows 7 Mobile: Use of PIN to Lock SIM Card
    • Windows 7 Mobile: Changing the Password of the Phone
  • Mobile Security Tools
    • Mobile Security Tools: PhoneBAK Anti-theft
    • Mobile Security Tools
  • Bluetooth Security Checklist
  • Mobile Phone Security Checklist

2. CyberSAFE (Securing Assets For End-Users)

Enquire For Price & Details

Course Overview

Prepare End-Users to be Security Savvy with Company Data

Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. This course will help you to understand security compliance considerations, social engineering, malware, and various other data security-related concepts. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.

There is an increasing reliance on workplace technologies and ensuring their proper use is critical to the protection of our information systems. This course is designed to meet the needs of all organizations, irrespective of size, industry, or geographic location.

Validate your knowledge of cybersecurity preparedness with a short assessment at the end of class.

Certification

Certified CyberSAFE

What You'll Learn

  • Identify many of the common risks involved in using conventional end-user technology
  • Identify the need for security.
  • Secure devices like desktops, laptops, smartphones, and more
  • Secure your use of the Internet
  • This course is designed for you as a non-technical end-user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks.

Who Needs to Attend

Information technology end-users

Prerequisites

There are no prerequisites for this course.

Follow-On Courses

There are no follow-ons for this course.

Course Outline

  1. Identifying the Need for Security
  • Identify Security Compliance Requirements
  • Recognize Social Engineering
  1. Securing Devices
  • Maintain Physical Security of Devices
  • Use Passwords for Security
  • Protect Your Data
  • Identify and Mitigate Malware
  • Use Wireless Devices Securely
  1. Using the Internet Securely
  • Browse the Web Safely
  • Use Email Securely
  • Use Social Networking Securely
  • Use Cloud Services Securely

3. CyberSec First Responder: Threat Detection and Response

Enquire For Price & Details

Course Overview

Gain a broad view of how to respond to a cybersecurity incident while preparing for the CyberSec First Responder certification.

This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a computer security incident response team (CSIRT). The course introduces strategies, frameworks, methodologies, and tools to manage cybersecurity risks, identify various types of common threats, design and operate secure computing and networking environments, assess and audit the organization’s security, collect, and analyze cybersecurity intelligence, and handle incidents as they occur. The course also covers closely related information assurance topics such as auditing and forensics to provide a sound basis for a comprehensive approach to security aimed toward those on the front lines of defense.

In addition, this course can help students who are looking to fulfill DoD directive 8570.01 for information assurance (IA) training. This program is designed for personnel performing IA functions, establishing IA policies and implementing security measures and procedures for the Department of Defense and affiliated information systems and networks.

Certification

CyberSec First Responder: Threat Detection and Response (Exam CFR-101) certification

What You'll Learn

  • Assess information security risk in computing and network environments
  • Create an information assurance lifecycle process
  • Analyze threats to computing and network environments
  • Design secure computing and network environments
  • Operate secure computing and network environments
  • Assess the security posture within a risk management framework
  • Collect cybersecurity intelligence information
  • Analyze collected intelligence to define actionable response
  • Respond to cybersecurity incidents
  • Investigate cybersecurity incidents
  • Audit secure computing and network environments

Who Needs to Attend

Cybersecurity practitioners who perform job functions related to protecting and defending information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation

Prerequisites and Follow On Courses

Prerequisites

  • Cybersecurity Foundations
  • Understanding Networking Fundamentals

Follow-On Courses

  • CyberSec First Responder: Threat Detection and Response
  • Certified Ethical Hacker v9
  • Troubleshooting TCP/IP Networks with Wireshark

Course Outline

  1. Assessing Information Security Risk
  • Identify the Importance of Risk Management
  • Assess Risk
  • Mitigate Risk
  • Integrate Documentation into Risk Management

 

  1. Creating an Information Assurance Lifecycle Process
  • Evaluate Information Assurance Lifecycle Models
  • Align Information Security Operations to the Information Assurance Lifecycle
  • Align Information Assurance and Compliance Regulations

 

  1. Analyzing Threats to Computing and Network Environments
  • Identify Threat Analysis Models
  • Assess the Impact of Reconnaissance Incidents
  • Assess the Impact of Systems Hacking Attacks
  • Assess the Impact of Malware
  • Assess the Impact of Hijacking and Impersonation Attacks
  • Assess the Impact of DoS Incidents
  • Assess the Impact of Threats to Mobile Security
  • Assess the Impact of Threats to Cloud Security

 

  1. Designing Secure Computing and Network Environments
  • Information Security Architecture Design Principles
  • Design Access Control Mechanisms
  • Design Cryptographic Security Controls
  • Design Application Security
  • Design Computing Systems Security
  • Design Network Security

 

  1. Operating Secure Computing and Network Environments
  • Implement Change Management in Security Operations
  • Implement Monitoring in Security Operations

 

  1. Assessing the Security Posture Within a Risk Management Framework
  • Deploy a Vulnerability Management Platform
  • Conduct Vulnerability Assessments
  • Conduct Penetration Tests on Network Assets
  • Follow Up on Penetration Testing

 

  1. Collecting Cybersecurity Intelligence Information
  • Deploy a Security Intelligence Collection and Analysis Platform
  • Collect Data from Security Intelligence Sources

 

  1. Analyzing Cybersecurity Intelligence Information
  • Analyze Security Intelligence to Address Incidents
  • Use SIEM Tools for Analysis

 

  1. Responding to Cybersecurity Incidents
  • Deploy an Incident Handling and Response Architecture
  • Perform Real-Time Incident Handling Tasks
  • Prepare for Forensic Investigation

 

  1. Investigating Cybersecurity Incidents
  • Create a Forensic Investigation Plan
  • Securely Collect Electronic Evidence
  • Identify the Who, Why, and How of an Incident
  • Follow Up on the Results of an Investigation

 

  1. Auditing Secure Computing and Network Environments
  • Deploy a Systems and Processes Auditing Architecture
  • Prepare for Audits
  • Perform Audits Geared Toward the Information Assurance Lifecycle

Labs

Lab 1: Implementing a Threat Assessment Model

Lab 2: Examining Reconnaissance Incidents

Lab 3: Assessing the Impact of System Hijacking Attempts

Lab 4: Assessing the Impact of Malware

Lab 5: Assessing the Impact of Hijacking and Impersonation attacks

Lab 6: Assessing the Impact of DoS Incidents

Lab 7: Assessing the Impact of Threats to Mobile Devices

Lab 8: Designing Cryptographic Security Controls

Lab 9: Designing Application Security

Lab 10: Implementing Monitoring in Security Operations

Lab 11: Deploying a Vulnerability Management Platform

Lab 12: Conducting Vulnerability Assessments

Lab 13: Conducting Penetration Testing on Network Assets

Lab 14: Collecting and Analyzing Security Intelligence

Lab 15: Collecting Security Intelligence Data

Lab 16: Capturing and Analyzing Baseline Data

Lab 17: Analyzing Security Intelligence

Lab 18: Incorporating SIEMS into Security Intelligence Analysis

Lab 19: Developing an Incidence Response System

Lab 20: Securely Collecting Electronic Evidence

Lab 21: Analyzing Forensic Evidence

Lab 22: Preparing for an Audit

Lab 23: Performing Audits


Advance Courses

1. CompTIA Security

Enquire For Price & Details

Duration

Traditional Instructor Led Learning – 5.00 Day(s)

Overview

The CompTIA® Security+® (2011 Objectives) course is designed to help you prepare for the SY0-301 exam. Students will implement and monitor security on networks, applications, and operating systems, and respond to security breaches.

Who Should Attend

This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security ics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

At Course Completion

Upon successful completion of this course, students will be able to: – identify the fundamental concepts of computer security. – identify security threats and vulnerabilities. – examine network security. – manage application, data and host security. – identify access control and account management security measures. – manage certificates. – identify compliance and operational security measures. – manage risk. – manage security incidents. – develop business continuity and disaster recovery plans.

Course Outline

Lesson 1: Security Fundamentals
Information Security Cycle
Information Security Controls
Authentication Methods
Cryptography Fundamentals
Security Policy Fundamentals

Lesson 2: Security Threats and Vulnerabilities
Social Engineering
Physical Threats and Vulnerabilities
Network-Based Threats
Wireless Threats and Vulnerabilities
Software Based Threats

Lesson 3: Network Security
Network Devices and Technologies
Network Design Elements and Components
Implement Networking Protocols
Apply Network Security Administration Principles
Secure Wireless Traffic

Lesson 4: Managing Application, Data and Host Security
Establish Device/Host Security
Application Security
Data Security
Mobile Security

Lesson 5: Access Control, Authentication, and Account Management
Access Control and Authentication Services
Implement Account Management Security Controls

Lesson 6: Managing Certificates
Install a Certificate Authority (CA) Hierarchy
Enroll Certificates
Secure Network Traffic by Using Certificates
Renew Certificates
Revoke Certificates
Back Up and Restore Certificates and Private Keys
Restore Certificates and Private Keys

Lesson 7: Compliance and Operational Security
Physical Security
Legal Compliance
Security Awareness and Training

Lesson 8: Risk Management
Risk Analysis
Implement Vulnerability Assessment Tools and Techniques
Scan for Vulnerabilities
Mitigation and Deterrent Techniques

Lesson 9: Managing Security Incidents
Respond to Security Incidents
Recover from a Security Incident

Lesson 10: Business Continuity and Disaster Recovery Planning
Business Continuity
Plan for Disaster Recovery
Execute Disaster Recovery Plans and Procedures


2. Certified Ethical Hacker v10

Enquire For Price & Details

Course Overview

The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. Since its inception in 2003, the Certified Ethical Hacker has been the absolute choice of the industry globally. It is a respected certification in the industry and is listed as a baseline certification on the United States Department of Defense Directive 8570. The C|EH exam is ANSI 17024 compliant adding credibility and value to credential members.

C|EH is used as a hiring standard and is a core sought after certification by many of the Fortune 500 organizations, governments, cybersecurity practices, and a cyber staple in education across many of the most prominent degree programs in top Universities around the globe.

Hundreds of Thousands of InfoSec Professionals as well as Career Starters have challenged the exam and for those who passed, nearly all are gainfully employed with successful careers, but the landscape is changing. Cyber Security as a profession is evolving, the barrier to entry is rising, the demand for Skilled Cyber professionals continues to grow, but it is being refined, demanding a higher level of skill and ability. EC-Council raises the bar again for ethical hacking training and certification programs with the all new C|EH v10!

Top 10 Critical Components of C|EH v10

1. 100% Compliance to NICE 2.0 Framework
C|EH v10 maps 100 percent to NICE framework’s Protect and Defend specialty area

2. Inclusion of New Module

Vulnerability Analysis
Learn how to perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems. This module covers the vulnerability management life cycle, and various approaches and tools used to perform the vulnerability assessment.
IoT Hacking
Understand the potential threats to IoT platforms and learn how to defend IoT devices
securely.

3. Focus on Emerging Attack Vectors (e.g., Cloud, AI, ML, etc.)
C|EH provides an insight into cloud computing threats and cloud computing attacks. It discusses cloud computing security and the necessary tools. It provides an overview of pen-testing steps which an ethical hacker should follow to perform a security assessment of the cloud environment.

Artificial Intelligence (AI) is an emerging solution used in defending networks against various attacks that an antivirus scan cannot detect. Learn how this can be deployed through the C|EH course.

4. Hacking Challenges at the End of Each Module
Challenges at the end of each modules ensures you can practice what you have learnt. They help student understand how knowledge can be transformed as skills and can be used to solve real-life issues.

5. Coverage of latest Malware
The course is updated to include the latest ransomware, banking and financial malware, IoT botnets, Android malwares and more!

6. Inclusion of complete Malware Analysis Process
Discover and learn how to reverse engineer malware in order to determine the origin, functionality, and potential impact of a malware. By performing malware analysis, the detailed information regarding the malware can be extracted, analysed and this is a crucial skill of an ethical hacker.

7. Hands-on Program
More than 40 percent of class time is dedicated to the learning of practical skills and this is achieved through EC-Council labs. Theory to practice ratio for C|EH program is 60:40 providing students with a hands-on experience of the latest hacking techniques, methodologies, tools, tricks, etc.

C|EH comes integrated with labs to emphasize the learning objectives. It also provides additional labs that students can practice post training on their own time, through EC-Council’s iLabs platform which students can purchase separately.

8. Lab environment simulates a real-time environment
C|EH v10 lab environment consists of latest operating systems including Windows Server 2016 and Windows 10 configured with Domain Controller, firewalls, and vulnerable web applications for honing the skills of hacking.

9. Covers latest hacking tools (Based on Windows, MAC, Linux, and Mobile)
The C|EH v10 course includes a library of tools that is required by security practitioners and pentesters to find uncover vulnerabilities across different operation platforms. This provides a wider option to students than any other programs in the market.

10. ANSI Accreditation
ANSI accreditation signifies that the certification holder has completed a prescribed course of study designed specifically to meet predefined industry requirements

 

Who is it for?

The Certified Ethical Hacking training course will significantly benefit Ethical hackers, System Administrators, Network Administrators and Engineers, Webmanagers, Auditors, Security Professionals in general.

Duration

 5 Days (9:00 AM – 5:00 PM)

Exam Info

C|EH (ANSI)
• Exam Title: Certified Ethical Hacker (ANSI)
• Exam Code: 312-50 (ECC EXAM), 312-50 (VUE)
• Number of Questions: 125
• Duration: 4 hours
• Availability: ECCEXAM / VUE
• Test Format: Multiple Choice
• Passing Score: Please refer to
https://cert.eccouncil.org/faq.html

C|EH (PRACTICAL)
• Exam Title: Certified Ethical Hacker (Practical)
• Number of Practical Challenges:20
• Duration: 6 hours
• Availability: Aspen- iLabs
• Test Format: iLabs cyber range
• Passing Score: 70%

The C|EH (Practical) is a 6 hours practical exam built to exacting specifications by subject matter experts in the EH field. Professionals that possess the C|EH credential will be able to sit for exam that will test their limits in unearthing vulnerabilities across major operating systems, databases, and networks. To those who meet and exceed the skills level set, they will earn the new industry required certification – the C|EH (Practical) certification.

C|EH (Practical) is available fully proctored, online, with remote facilities globally.
The combined benefit of a practical exam that is fully proctored anywhere in the world will provide organizations with a skills-validated and trusted credential when employing cybersecurity professionals. With its global availability, organizations can now quickly train, test and deploy a cyber-ready workforce effectively

Eligibility Criteria

• Be a CEH member in good standing (Your USD 100 application fee will be waived);
• or Have a minimum of 3 years working experience in InfoSec domain (You will need to pay USD 100 as a non-refundable application fee);
• or Have any other industry equivalent certifications such as OSCP or GPEN cert (You will need to pay USD 100 as a non-refundable application fee).

EC-Council VAPT Learning Track

EC-Council’s cybersecurity programs and credentials are organized into tracks to allow professionals to specialize in a particular domain or gain advancements with added recognition and skills, one after the other.

CND is the world’s most advanced network defense course that covers 14 of the most current network security domains any individuals will ever want to know when they are planning to protect, detect, and respond to the network attacks. The course contains hands-on labs, based on major network security tools and to provide network administrators real world expertise on current network security technologies and operations.

C|EH is the world’s most advanced ethical hacking course covering 20 of the most important security domains any individual will need when they are planning to beef-up the information security posture of their organization. The course provides hacking techniques and tools used by hackers and information security professionals. To provide employers with the confidence that you not only know your stuff, but can do the job, challenge the C|EH (Practical) exam to proof your skills.

ECSA is a globally respected penetration testing program that covers the testing of modern infrastructures, operating systems, and application environments while teaching the students how to document and prepare professional penetration testing report. This program takes the tools and techniques covered in C|EH to next level by utilizing EC-Council’s published penetration testing methodology.

Employers can today trust not only know your knowledge in pentesting, but your skills when you produce your ECSA (Practical) credential to proof your skills.

L PT The Advanced Penetration Testing program is the capstone to EC-Council’s entire information security track, right from the C|EH to the ECSA Program. The course brings advanced pentesting skills not covered in the ECSA course offering students even more advanced techniques employed by experienced pentesters.

The LPT (Master) exam covers the entire Penetration Testing process and lifecycle with keen focus on report writing, required to be a true professional Penetration Tester.
Each program offers domain specific knowledge, training and ability to prepare a professionals through their job requirements bringing career advancement and opportunities.
.

Course Outline

1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. Vulnerability Analysis
6. System Hacking
7. Malware Threats
8. Sniffing
9. Social Engineering
10. Denial-of-Service
11. Session Hijacking
12. Evading IDS, Firewalls, and Honeypots
13. Hacking Web Servers
14. Hacking Web Applications
15. SQL Injection
16. Hacking Wireless Networks
17. Hacking Mobile Platforms
18. IoT Hacking
19. Cloud Computing
20. Cryptography

 


3. Certified Information Security Systems Professional (CISSP)

Enquire For Price & Details

CISSP Course Overview

New Horizons CISSP Training is the most comprehensive review of information security concepts and industry best practices, and covers the 10 domains of the CISSP CBK (Common Body of Knowledge).

This training course will help candidates review and refresh their information security knowledge and help identify areas they need to study for the CISSP exam.

Several types of activities are used throughout the course to reinforce topics and increase knowledge retention. These activities include open ended questions from the instructor to the students, matching and poll questions, group activities, open/closed questions, and group discussions.

This interactive learning technique is based on sound adult learning theories.

Who Should Attend?

The course is intended for students who have at least four years of recent full-time security professional work experience in two or more of the ten domains of the (ISC)² Certified Information System Security Professional (CISSP) Common Body of Knowledge (CBK), including experience with the architecture, design, management, risk, and controls that assure the security of business environments. The course builds on and brings together the holistic view of the topics covered in the everyday environment of an information systems security professional. Professional experience including the following will greatly enhance the learning environment.

  • Work requiring special education or intellectual attainment, usually including a liberal education or college degree
  • Work requiring habitual memory of a body of knowledge shared by others doing similar work
  • Management/supervision of projects and/or employees
  • Work requiring the exercise of judgment, management decision-making, and discretion
  • Work requiring the exercise of ethical judgment (as opposed to ethical behavior)
  • Professional writing and oral communication (e.g., presentation)
  • Research and development
  • The specification and selection of controls and mechanisms
  • Applicable job title examples include: CISO, director, manager, supervisor, analyst, cryptographer, cyber architect, information assurance engineer, instructor, professor, lecturer, investigator, computer scientist, program manager, and lead

Course Objectives

After completing this workshop, participants will be able to:

  • Identify key purposes, benefits, and processes of information classification and how it is used to determine access control policies and identify the process for assessing the effectiveness of implemented controls
  • Understand the bascis of telecommunication and network security concepts, required components for minimizing security risks, securing channels of communication, and techniques for preventing and detecting network-based attacks
  • Define and apply information security governance and Risk Management Framework including the policies, concepts, principles, structures and standards that are established for the protection of information assets and how to assess the effectiveness of that protection
  • Explain the details of software development security, including the activities and processes pertaining to the planning, programming, and management of software and systems that manage software, including ways to secure applications through design and control interfaces and assess the usefulness of their application security.
  • Identify the concepts within cryptography, including the terms and application of public and private algorithms, distribution management, methods of attack, and the application, development, and use of digital signatures for authenticity, electronic transactions, and nonrepudiation processes
  • Identify security architecture and design concepts, focusing on the architecture of security systems that provide for the availability, integrity, and confidentiality of organizational assets as well as the concepts, principles, structures, frameworks, and standards used in the design and implementation of security requirements of individual components and enterprise-wide systems
  • Identify the key terms and processes of security operations and how to protect and control information processing assets in a centralized or distributed environment
  • Identify and apply the business continuity and disaster recovery planning requirements necessary to ensure the preservation of the business in case of major disruptions to normal business operations, including the project scope, planning and how to conduct a business impact analysis, identify recovery strategies, develop the recovery plan, and implement it
  • Define and explain the legal, regulations, investigations, and compliance concepts of internationally accepted methods, processes, and procedures used in computer crime legislation; regulations specific to the investigative measures and techniques used to identify the occurrence of an incidence; and the gathering, analysis, and management of evidence
  • Define and apply the requirements necessary for the overall physical (environmental) security processes for the evaluation of physical, environmental, and procedural risks that might be present in a facility, organization, or structure where information systems are stored and managed

Course Outline

  1. Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity) 
  • Confidentiality, integrity, and availability concepts
  • Security governance principles
  • Compliance
  • Legal and regulatory issues
  • Professional ethics
  • Security policies, standards, procedures and guidelines
  • Business continuity requirements
  • Personnel security policies
  • Risk management concepts
  • Threat modeling
  • Risk considerations
  • Security education, training, and awareness

 

  1. Asset Security (Protecting Security of Assets)
  • Information and asset classification
  • Ownership (e.g. data owners, system owners)
  • Protect privacy
  • Appropriate retention
  • Data security controls
  • Handling requirements (e.g. markings, labels, storage)

 

  1. Security Engineering (Engineering and Management of Security)
  • Engineering processes using secure design principles
  • Security models fundamental concepts
  • Security evaluation models
  • Security capabilities of information systems
  • Security architectures, designs, and solution elements vulnerabilities
  • Web-based systems vulnerabilities
  • Mobile systems vulnerabilities
  • Embedded devices and cyber-physical systems vulnerabilities
  • Cryptography
  • Site and facility design secure principles
  • Physical security

 

  1. Communication and Network Security (Designing and Protecting Network Security)
  • Secure network architecture design (e.g. IP & non-IP protocols, segmentation)
  • Secure network components
  • Secure communication channels
  • Network attacks

 

  1. Identity and Access Management (Controlling Access and Managing Identity)
  • Physical and logical assets control
  • Identification and authentication of people and devices
  • Identity as a service (e.g. cloud identity)
  • Third-party identity services (e.g. on-premise)
  • Access control attacks
  • Identity and access provisioning lifecycle (e.g. provisioning review)

 

  1. Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing)
  • Assessment and test strategies
  • Security process data (e.g. management and operational controls)
  • Security control testing
  • Test outputs (e.g. automated, manual)
  • Security architectures vulnerabilities

 

  1. Security Operations (Foundational Concepts, Investigations, Incident Management, and Disaster Recovery)
  • Investigations support and requirements
  • Logging and monitoring activities
  • Provisioning of resources
  • Foundational security operations concepts
  • Resource protection techniques
  • Incident management
  • Preventative measures
  • Patch and vulnerability management
  • Change management processes
  • Recovery strategies
  • Disaster recovery processes and plans
  • Business continuity planning and exercises
  • Physical security
  • Personnel safety concerns

 

  1. Software Development Security (Understanding, Applying, and Enforcing Software Security)
  • Security in the software development lifecycle
  • Development environment security controls
  • Software security effectiveness
  • Acquired software security impact

4. EC Council Security Analyst (ECSA) v9 Training

Enquire For Price & Details

What is the EC-Council Security Analyst program?

You are an ethical hacker. In fact, you are a Certi­ed Ethical Hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep. You have su-cient knowledge and an arsenal of hacking tools and you are also pro­cient in writing custom hacking code.

Is that enough?

Can you become an industry accepted security professional? Will organizations hire you to help them protect their systems? Do you have any knowledge in applying a suitable methodology to conduct a penetration test for an enterprise client? Do you have any experience writing a custom penetration testing report?

More importantly, do you have a globally recognized certification that can verify your penetration testing capabilities?

If you are the person above, what you may be lacking is the knowledge and experience to execute a successful penetration test according to accepted industry standards.

The ECSA is a security credential like no other! The ECSA course provides you with a real world hands-on penetration testing experience and is a globally accepted hacking and penetration testing class available that covers the testing of modern infrastructures, operating systems and application environments while teaching the students how to document and write a penetration testing report.

The ECSA program takes the tools and techniques you learned in the Certi­fied Ethical Hacker course (CEH) and elevates your ability into full exploitation by teaching you how to apply the skills learned in CEH by utilizing EC-Council’s published penetration testing methodologies.

It is a highly interactive, comprehensive, standards-based and methodology intensive 5-day security training program 5-day which teaches information security professionals to conduct real life penetration tests.

This course is part of the Information Security Track of EC-Council. This is a “Professional” level course, with the Certi­fied Ethical Hacker being the “Core” and the Licensed Penetration Tester being the “Master” level certification.

The Cyber Range iLabs

As the ECSA course is a fully hands-on program, the exercises cover real world scenario. By practicing the skills that are provided to you in the ECSA class, we are able to bring you up to speed with the latest threats that organizations may be vulnerable to.

This can be achieved with the EC-Council Cyber Range iLabs. It allows you to dynamically access a host of Virtual Machines precon­gured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection.

Our web portal enables you to launch an entire range of target machines and access them remotely with one simple click. It is the most cost e-ective and easy to use live range lab solution available.

With iLabs, lab exercises can be accessed 24×7, allowing the student to practice skills in a safe and fully functional network anytime it is convenient.

Our guided step-by-step labs include exercises with detailed tasks, supporting tools, and additional materials as well as our state-of-the-art “Open Environment” allowing you to launch a complete live range open for any form of hacking or testing.

Available target machines are completely virtualized, allowing you to control and reset machines quickly and easily with no required instructor or administrative interaction.

Skills Based Competency

The ECSAV9 penetration testing course is designed to enhance the skills based competency of a penetration tester. This course is intensively hands-on and a tremendous amount of emphasis is placed on the practical competency of the student.

Unlike the previous version of ECSA exam, in the new ECSAv9, a student will only be allowed to challenge the ECSA exam after meeting certain eligibility requirements.

To become eligible, a student must conduct a detailed penetration test through the EC-Council Cyber Range iLabs environment and submit a written report via EC-Council’s ASPEN system.

Only candidates that successfully complete the penetration test in the Cyber Range iLabs environment are allowed to challenge the ECSA exam.

You will conduct a penetration test on a company that has various departments, subnets and servers, and multiple operating systems with defense mechanisms architecture that has both militarized and non-militarized zones.

The design of the course is such that the instructor in the class will actually take you through the core concepts of conducting a penetration test based on EC-Council’s published penetration testing methdology and guide you through the report writing process for this organization.

Who Should Attend

  • Ethical Hackers
  • Penetration Testers
  • Network Server Administrators
  • Firewall Administrators
  • Security Testers
  • System Administrators
  • Risk Assessment Professionals.

Duration

5 days (9:00 – 5:00)

Certi­fication Exam

The ECSA exam aims to test a candidate’s knowledge and application of critical penetration testing methodologies.

To be eligible to attempt the exam, candidates are required to perform real-world penetration testing over EC-Council’s secure cyber range and to produce a penetration test report that clearly documents the vulnerabilities found. This report will be graded by our professionals.

Candidates that successfully submit an acceptable report will proceed on to a multiple-choice exam that tests a candidate’s knowledge. Candidates that successfully pass the multiple-choice exam will be awarded the ECSA credential.

Your Toggle Title

Your Content

ECSA v9 Exam Information

Candidates that submit reports to the required standards will be provided with exam vouchers for the multiple-choice ECSA v9 exam. Multiple-choice exams are proctored online through the EC-Council Exam portal:

  • Credit Towards Certi­cation: ECSA v9
  • Number of Questions:150
  • Passing Score: 70%
  • Test Duration: 4 hours

The ECSA Assessment

The course comprises of 2 sets of lab challenges . Both are on the EC- Council ilabs Cyber Range. The ­rst set covers practise labs for each module. In all, there are 45 such labs in total. The other is a Challenge Scenario which mimics an actual penetration test in an imaginary ­nancial service company. As a pre-requisite, you will be required to actually complete a penetration testing activity and submit a report to EC-Council before you will be allowed to attempt the ECSA V9 Exam.

The Challenge Scenario
Brian works as a personal loan manager at FNB Financial Services which is a large multinational consulting corporation, headquartered in Atlanta, U.S.A. FNB specializes in personal, home equity, and debt consolidation loans around the world. Brian has been a trusted foot soldier for his organization for over a decade and is reeled in to handle only high-pro­le cases. Since Brian mostly telecommutes with his overseas clientele, he relies heavily on the network infrastructure of his organization.

Infrastructure Available to Brian
Like any large organization, FNB’s internal network consists of several subnets housing various organizational units. The front o-ce is connected to a separate subnet which connects to the company’s public-facing computers. The company has installed various kiosks to help customers understand their product and services. The front o-ce also has a Wi-Fi connectivity to cater users who carry their own smartphones and laptops.

The FNB’s internal network is made up of Militarized and Demilitarized Zones connected with a huge pool of database servers in Database Zone. As a security precaution, and by design, all the internal resource zones are con­gured with dierent subnet IPs. The militarized zone houses the application servers that provide application frameworks for various departments of the organization.

The Demilitarized Zone contains public facing systems of the organization such as web and mail servers.

FNB headquarters’ network topology and protocols are replicated around the world in all its satellite o­ces for easy communication with the headquarters.

Brian’s Predicament
Brian is all set to present a loan consolidation plan to one of his biggest client from Japan. Mr. Takamashi, client’s representative, has agreed for a video conference to go over and discuss Brian’s proposal. Half an hour before the call, Brian switches on his laptop which is connected to the company’s Wi-Fi and LAN, to make last minute tweaks in his proposal. To his horror he -nds all his -les gone. The hard drive of his laptop had been wiped clean with just one -le sitting in there titled, “Gothcha!”

Brian obviously had to postpone his call with the client which he knew did not go down well. He called the network admin of FNB to take a look at his computer. To his surprise the network admin informed him that this was something that employees of FNB were facing throughout the world.

Computers of FNB employees around the world were systematically being victimized by rampant hacking. The hacking was not only widespread, but was being executed so awlessly that the attackers, after compromising a system, stole everything of value and completely erased their tracks within 20 minutes.

Brian immediately brought this to the notice of the top management. Understandably they were concerned about their network and the reputation of their organization. The sheer volume of systems hacked was an alarming revelation for them.

The management has decided to seek the service of a penetration tester or security auditor to audit their networks for security vulnerabilities in order to avoid future attacks.

FNB has identi-ed you as a third-party penetration tester to perform the pen testing of their information infrastructure. Your challenge is to perform a thorough pen test so that people like Brian don’t have to cancel their business calls in future.

Course Outline

 Core Modules

  1. Security Analysis and Penetration Testing Methodologies
  2. TCP IP Packet Analysis
  3. Pre-penetration Testing Steps
  4. Information Gathering Methodology
  5. Vulnerability Analysis
  6. External Network Penetration Testing Methodology
  7. Internal Network Penetration Testing Methodology
  8. Firewall Penetration Testing Methodology
  9. IDS Penetration Testing Methodology
  10. Web Application Penetration Testing Methodology
  11. SQL Penetration Testing Methodology
  12. Database Penetration Testing Methodology
  13. Wireless Network Penetration Testing Methodology
  14. Mobile Devices Penetration Testing Methodology
  15. Cloud Penetration Testing Methodology
  16. Report Writing and Post Test Actions

Self-Study Modules

  1. Password Cracking Penetration Testing
  2. Router and Switches Penetration Testing
  3. Denial-of-Service Penetration Testing
  4. Stolen Laptop, PDAs and Cell Phones Penetration Testing
  5. Source Code Penetration Testing
  6. Physical Security Penetration Testing
  7. Surveillance Camera Penetration Testing
  8. VoIP Penetration Testing
  9. VPN Penetration Testing
  10. Virtual Machine Penetration Testing
  11. War Dialing
  12. Virus and Trojan Detection
  13. Log Management Penetration Testing
  14. File Integrity Checking
  15. Telecommunication and Broadband Communication
  16. Email Security Penetration Testing
  17. Security Patches Penetration Testing
  18. Data Leakage Penetration Testing
  19. SAP Penetration Testing
  20. Standards and Compliance
  21. Information System Security Principles
  22. Information System Incident Handling and Response
  23. Information System Auditing and Certification

Note: Self-study modules are available in ASPEN portal


5. EC-Council Certified Secure Programmer-.NET

Enquire For Price & Details

Course Description

Software defects, bugs, and flaws in the logic of the program are consistently the cause for software vulnerabilities. Analysis by software security professionals has proven that most vulnerabilities are due to errors in programming. Hence, it has become a must for organizations to educate their software developers about secure coding practices.

Attackers try to find security vulnerabilities in the applications or servers and then try to use these vulnerabilities to steal secrets, corrupt programs and data, and gain control of computer systems and networks. Sound programming techniques and best practices can be used to develop high quality code to prevent web application attacks. Secure programming is a defensive measure against attacks targeted towards application systems.

This course will be invaluable to software developers and programmers alike to code and develop highly secure applications and web applications. This is done throughout the software life cycle that involves designing, implementing, and deployment of applications.

.Net is widely used by almost all organizations as the leading framework to build web applications. The course teaches developers how to identify security flaws and implement security countermeasures throughout the software development life cycle to improve the overall quality of products and applications.

EC-Council Certified Secure Programmer lays the foundation required by all application developers and development organizations to produce applications with greater stability and fewer security risks to the consumer. The Certified Secure Application Developer standardizes the knowledge base for application development by incorporating the best practices followed by experienced experts in the various domains.

This course is purposefully built with tons of labs peppered throughout the three days of training, offering participants critical hands on time to fully grasp the new techniques and strategies in secure programming.

Course Objectives

This course will:

  • Familiarize you with .Net Application Security, ASP.Net Security Architecture and help you understand the need for application security and common security threats to .Net framework
  • Discuss security attacks on .Net frame work and explain the secure software development life cycle
  • Help you to understand common threats to .Net assemblies and familiarize you with stack walking processes
  • Discuss the need for input validation, various input validation approaches, common input validation attacks, validation control vulnerabilities, and best practices for input validation
  • Familiarize you with authorization and authentication processes and common threats to authorization and authentication
  • Discuss various security principles for session management tokens, common threats to session management, ASP.Net session management techniques, and various session attacks
  • Cover the importance of cryptography in .Net, different types of cryptographic attacks in .Net, and various .Net cryptography namespaces
  • Explain symmetric and asymmetric encryption, hashing concepts, digital certificates, digital and XML signatures
  • Describe the principles of secure error handling, different levels of exception handling, and various .Net logging tools
  • Examine file handling concepts, file handling security concerns, path traversal attacks on file handling, and defensive techniques against path traversal attack

What You Will Learn

Students in this course will acquire knowledge in the following areas:

  • .Net framework security features and various secure coding principles
  • .Net framework run time security model, role-based security, code access security (CAS), and class libraries security
  • Various validation controls, mitigation techniques for validation control vulnerabilities, defensive techniques for SQL injection attacks, and output encoding to prevent input validation attacks
  • Defensive techniques against session attacks, cookie security, and View State security
  • Mitigating vulnerabilities in class level exception handling, managing unhandled errors, and implementing windows log security against various attacks
  • Defensive techniques against path traversal attacks and defensive techniques against canonicalization attack and file ACLs
  • Mitigating vulnerabilities in machine config files, mitigating the vulnerabilities in app config files, and security code review approaches
  • The importance of secure programmers and certified secure programmers, the career path of secure programmers, and the essential skill set of secure programmers.

ECSP Course Outline

  • You must be well-versed with .NET programming language.
  • The ECSP certification is intended for programmers who are responsible for designing and building secure Windows/Web based applications with .NET Framework. It is designed for developers who have .NET development skills.
  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 Hours
  • Test Format: Multiple Choice
  • Test Delivery: EC-Council Exam Centre
  • Exam Prefix: 312-93

 

Course Outline

Module 01: Introduction t.NET Application Security

  • Microsoft .NET Application Security
    • NET Application Security
    • Need for .NET Application Security
    • .NET Application Attack Statistics
    • Understanding Application Security
    • End-to-End Security
    • What is Secure Coding?
    • Why are Security Mistakes Made?
    • Key Elements of .NET Framework Architecture Security
    • .NET Security Features
    • .NET Framework Security Namespaces
    • ASP.NET Security Architecture
  • Common Security Threats on .NET
    • Web Application Security Frame
    • Common Security Threats on .NET
    • OWASP Top 10 Attacks on .NET
  • Security Misconfiguration
  • Cross-Site Scripting (XSS) Attacks
  • SQL Injection Attacks
  • Cross-Site Request Forgery (CSRF) Attack
  • Failure tRestrict URL Access
  • Insufficient Transport Layer Protection
  • Unvalidated Redirects and Forwards
  • Insecure Direct Object References
  • Broken Authentication and Session Management
  • Insecure Cryptographic Storage
  • Secure Development Lifecycle (SDL)
    • Phases of SDL
    • SDL Process
    • Integrating Security intthe Development Lifecycle
    • Security in the Design Stage: Threat Modeling
    • Threat Modeling Process
  • The STRIDE model
  • The DREAD model
  • Guidelines for Applying Security in Implementation Phase of SDL
  • Security Testing
  • Secure Coding Principles
  • Guidelines for Developing Secure Codes

Module 02: .NET Framework Security

  • Introduction t.NET Framework
    • .NET Framework Architecture
    • Basic Components of .NET Framework
  • .Net Runtime Security
    • .NET Framework Runtime Security Model
    • Role-Based Security
  • Role-Based Security: Windows Principal
  • Role-Based Security: Generic Principal
    • Code Access Security (CAS)
  • Using Code Access Security in ANET
  • Evidence-Based Security
  • Permissions
  • Code Access Permissions
  • Identity Permissions
  • Role-Based Security Permissions
  • Permissions Classes in .NET
  • Type Safety
  • SkipVerification
  • Stack Walk
  • Declarative and Imperative Security Syntax
    • Isolated Storage
  • Data Storing Process in Isolated Storage
  • Managing Data Isolation using Store’s Identity
  • Levels of Isolation
  • Limitations of Isolated Storage
  • Administering Isolated Storage
  • Granting Isolated Storage Permissions with Mscorcfg.msc
  • Granting Isolated Storage Permissions with Caexe
  • Managing Existing Stores
  • .NET Class Libraries Security
    • Class Libraries Security
    • Writing Secure Class Libraries
  • Security Demands
  • Link Demands
  • Security Holes in Link Demands
  • Inheritance Demands
  • Overriding Security Checks
  • Security Optimizations
  • .NET Assembly Security
  • .NET Assembly
    • Common Threats NET Assemblies
    • Privileged Code
    • Secure Assembly Design Considerations
    • Secure Class Design Considerations
    • Securing Assemblies Using Strong Name Signing
    • Securing Assemblies with Code Access Attributes
    • Securing Assemblies Against Decompilation Using Obfuscation
    • Dotfuscator: .NET Obfuscator
    • Protecting Assemblies Using Publisher Certificate
    • Securing Assemblies Using Application Domain Permissions
    • Vulnerability in Serializing Sensitive Objects
    • Vulnerabilities in Multithreaded Assemblies
    • Vulnerabilities in Static Class Methods/ Constructors of Assemblies
    • Vulnerability in Dispose Methods
  • .NET Security Tools
    • Code Access Security Policy Tool: Caspol.exe
  • Caspol.exe Parameters
    • Software Publisher Certificate Test Tool: Cert2spc.exe
    • Certificate Manager Tool: Certmgr.exe
  • Options in Certmgr.exe
    • Certificate Creation Tool: Makecert.exe
  • Options in Makecerexe
    • PEVerify Tool: Peverify.exe
  • Options in Peverify.exe
    • .NET Security Annotator Tool: SecAnnotate.exe
    • Sign Tool: SignTool.exe
    • Strong Name Tool: Sn.exe
    • Isolated Storage Tool: Storexe
  • Best Practices for .NET Framework Security

Module 03: Input Validation and Output Encoding

  • Input Validation
    • Why Input Validation?
    • Input Validation
    • Input Validation Specification
    • Input Validation Approaches
  • Client-side Input Validation
  • Server-side Input Validation
  • Client-Server Input Validation Reliability
    • Input Filtering
  • Input Filtering Technique: Black Listing
  • Input Filtering Technique: White Listing
    • Perform Input Validation and Filtering using a Regular Expression
    • String Manipulation and Comparison
    • Data Type Conversion
    • ASP.NET Validation Controls
  • Set of ASP.NET Validation Controls
  • RequiredField Validation Control
  • Range Validation Control
  • Comparison Validation Control
  • RegularExpression Validation Control
  • Custom Validation Control
  • Validation Summary Control
  • Input Validation Attacks
    • Cross Site Scripting (XSS) Attack
    • SQL Injection Attacks
    • HTML Tags Used in XSS Attack
  • Defensive Techniques against XSS Attacks
    • XSS Attack Defensive Techniques
    • Need for Securing Validation Controls
    • Securing RequiredField Validation Control
    • Securing Range Validation Control
    • Specifying the Correct Data Type in Range Validator
    • Securing Comparison Validation Control
    • Securing RegularExpression Validation Control
    • Securing Custom Validation Control
    • Integrating Security for Multiple Validation Controls
  • Defensive Techniques against SQL Injection Attacks
    • SQL Injection Attack Defensive Techniques
    • Using Parameterized Queries
    • Using Parameterized Stored Procedures
    • Using Escape Routines tHandle Special Input Characters
    • Database Specific Escaping: Oracle Escaping
    • Using a Least-Privileged Database Account
    • Constraining Input
  • Output Encoding
    • ASP.NET Controls with Encoding Support
    • Encoding Unsafe Output using HtmlEncode
    • Encoding Unsafe Output using UrlEncode
    • Anti-XSS Library
    • Encoding Output using Anti-XSS Library
  • Sandboxing
    • Sandboxing Software: Sandboxie
    • Sandboxing Software: BufferZone Pro
    • Sandboxing API in .NET Framework
    • Creating Sandbox for Partial Trust Code
  • Best Practices
    • Microsoft Code Analysis Tool .NET (CAT.NET)

Module 04: .NET Authorization and Authentication

  • Introduction tAuthentication and Authorization
    • Common Threats with User Authentication and Authorization
    • Authentication and Authorization in .NET Web Application Security
    • Security Relationship between IIS and ASP.NET
  • Authentication
    • ASP.NET Authentication
    • ASP.NET Authentication Modes
    • Security Settings Matrix between IIS and ASP.NET
    • Forms Authentication
    • Passport Authentication
  • Implementing Passport Authentication
    • Custom Authentication
  • Implementing Custom Authentication Scheme
    • Windows Authentication
    • Selecting an Appropriate Authentication Method
    • Determining an Authentication Method
    • Enterprise Services Authentication
    • SQL Server Authentication
  • Authorization
    • Identities, Principals, and Roles
    • ASP.NET Authorization
    • URL Authorization
    • File Authorization
  • What is Impersonation?
    • Impersonation Options
    • Delegation
  • Code-based Authorization
  • Declarative Authorization
  • Imperative Authorization
  • Explicit Authorization
    • Authorization using ASP.NET Roles
    • Enterprise Services Authorization
    • SQL Server Authorization
  • Authentication and Authorization Vulnerabilities
    • Securing Forms Authentication Tickets Securing Hash Generation using SHA1 Securing Encryption using AES
    • Securing Forms Authentication Cookies using SSL
    • Securing Forms Authentication Credentials
    • Preventing Session Hijacking using Cookieless Authentication
    • Securing Authentication Token Using Sliding Expiration
    • Avoiding Forms Authentication Cookies from Persisting Using DisplayRememberMe Property
    • Avoiding Forms Authentication Cookies from Persisting Using RedirectFromLoginPage
    • Method
    • Avoiding Form Authentication Cookies from Persisting Using SetAuthCookie Method
    • Avoiding Form Authentication Cookies from Persisting Using GetRedirectUrl Method
    • Avoiding Form Authentication Cookies from Persisting Using FormsAuthenticationTicket
    • Constructor
    • Securing Passwords with minRequiredPasswordLength
    • Securing Passwords with minRequiredNonalphanumericCharacters
    • Securing Passwords with passwordStrengthRegularExpression
    • Restricting Number of Failed Logon Attempts
    • Securing Application by Using Absolute URLs for Navigation
    • Securing Applications from Authorization Bypass Attacks
    • Creating Separate Folder for Secure Pages in Application
    • Validating Passwords on CreateUserWizard Control using Regular Expressions
  • Authentication and Authorization Best Practices
    • Application Categories Considerations: Authentication-Forms
    • Application Categories Considerations: Authorization
    • Guidelines for Secure Authentication and Authorization Coding
    • Secure Development Checklists: Authentication
    • Secure Development Checklists: Authorization
    • Secure Development Checklists: User-Server Authentication
  • Secure Communication
    • Storing Secrets
    • Options for Storing Secrets in ASP.NET

Module 05: Secure Session and State Management

  • Session Management
    • Basic Security Principles for Session Management Tokens
    • Common Threats tSession Management
  • Session Management Techniques in ASP.NET
    • ASP.NET Session Management Techniques
    • Client-Side State Management
  • Client-Side State Management Using Cookies
  • Client-Side State Management Using Hidden Fields
  • Client-Side State Management Using View State
  • Client-Side State Management Using Control State
  • Client-Side State Management Using Query Strings
    • Server-Side State Management
  • Server-Side State Management Using Application Object
  • Server-Side State Management Using Session Object
  • Server-Side State Management Using Profile Properties
  • Session Attacks and Its Defensive Techniques
    • Session Hijacking
  • Securing ASP.NET Application from Session Hijacking
  • Implementing SSL tEncrypt Cookies
  • Setting a Limited Time Period for Expiration
    • Avoid using Cookieless Sessions
    • Avoid using UseUri Cookieless Sessions
    • Avoid Specifying Cookie Modes tAutoDetect
    • Avoid Specifying Cookie Modes tUseDeviceProfile
  • Enabling regenerateExpiredSessionID for Cookieless Sessions
  • Resetting the Session when User Logs Out
    • Token Prediction Attack
  • Generating Lengthy Session Keys tPrevent Guessing
  • Session Replay Attack
  • Defensive Techniques for Session Replay Attack
    • Session Fixation
    • Session Fixation Attack
  • Securing ASP.NET Application from Session Fixation Attack
    • Cross-Site Script Attack
  • Preventing Cross-Site Scripting Attack using URL Rewriting
  • Preventing Session Cookies from Client-Side Scripts Attacks
    • Cross-Site Request Forgery Attack
  • Implementing the Session Token tMitigate CSRF Attacks
  • Defensive Techniques for Cross Site Request Forgery Attack
    • Securing Cookie Based Session Management
    • Cookie-Based Session Management
    • Persistent Cookies Information Leakage
    • Avoid Setting the Expire Attribute tEnsure Cookie Security
    • Ensuring Cookie Security using the Secure Attribute
    • Ensuring Cookie Security using the HttpOnly Attribute
    • Ensuring Cookie Security using the Domain Attribute
    • Ensuring Cookie Security using Path Attribute
  • ViewState Security
    • Common Threats on ViewState
  • ViewState Data Tampering Attack
  • ViewState oneClick Attacks
  • Securing ViewStateSecuring
  • ViewState with Hashing
  • Securing ViewState with Encryption
  • Securing ViewState by Assigning User-Specific Key
  • Guidelines for Secure Session Management

Module 06: .NET Cryptography

  • Introduction to Cryptography
    • Cryptographic Attacks
    • What Should You DtKeep the .NET Application Away from Cryptographic Attacks?
    • Cryptography
    • Functions of Cryptography
    • Common Threats on Functions of Cryptography and Their Mitigation Techniques
    • Types of Cryptographic Attacks in .NET
    • .NET Cryptography Namespaces
    • .NET Cryptographic Class Hierarchy
  • Symmetric Encryption
    • Symmetric Algorithm Class
    • Members of the Symmetric Algorithm Class
    • Programming Symmetric Data Encryption and Decryption in .NET
    • Securing Information with Strong Symmetric Encryption Algorithm
    • Cipher Function
  • Cipher Modes
  • Vulnerability in Using ECB Cipher Mode
    • Padding
  • Problem with Zeros Padding
    • Symmetric Encryption Keys
  • Securing Symmetric Encryption Keys from Brute Force Attacks
  • Resisting Cryptanalysis Attack Using Large Block Size
  • Generating Non-Predictable Cryptographic Keys using RNGCryptoServiceProvider
    • Storing Secret Keys and Storing Options
  • Protecting Secret Keys with Access Control Lists (ACLs)
  • Protecting Secret Keys with DPAPI
    • Self Protection for Cryptographic Application
    • Encrypting Data in the Stream using CryptoStream Class
  • Asymmetric Encryption
    • Asymmetric Algorithm Class
    • Members of the Asymmetric Algorithm Class
    • Programming Asymmetric Data Encryption and Decryption in .NET
    • Asymmetric Encryption Algorithm Key Security
    • Securing Asymmetric Encryption using Large Key Size
    • Storing Private Keys Securely
    • Problem with Exchanging Public Keys
    • Exchanging Public Keys Securely
    • Asymmetric Data Padding
    • Protecting Communications with SSL
  • Hashing
    • Hashing Algorithms Class Hierarchy in .NET
    • Hashing in .NET
    • Members of the Hash Algorithm Class
    • Programming Hashing for Memory Data
    • Programming Hashing for Streamed Data
    • Imposing Limits on Message Size for Hash Code Security
    • Setting Proper Hash Code Length for Hash Code Security
    • Message Sizes and Hash Code Lengths Supported by the .NET Framework Hashing
    • Algorithms
    • Securing Hashing Using Keyed Hashing Algorithms
  • Digital Signatures
    • Attacker’s Target Area on Digital Signatures
    • Security Features of Digital Signatures
    • .NET Framework Digital Signature Algorithms
  • Digital Certificates
    • .NET Support for Digital Certificates
    • Programming Digital Signatures using Digital Certificates
  • XML Signatures
    • Need for Securing XML Files
    • Securing XML Files using Digital Signatures
    • Programming a Digital Signature for a Sample XML File

Module 07: .NET Error Handling, Auditing, and Logging

  • Error Handling
    • Parameters tbe Considered while Designing Secure Error Messages!
    • What is an Error?
    • What are Exceptions/Runtime Errors?
    • Need of Error/Exception Handling
    • Secure Exception Handling
    • Exception Handling in ASP.NET
    • Handling Exceptions in an Application
    • Class-Level Exception Handling
    • Class-Level Exception Handling Vulnerabilities
  • Generic Exception Throwing Vulnerability
  • Generic Exception Catching Vulnerability
  • Vulnerability in Printing StackTrace
  • Vulnerability in Exception.ToString() Method
  • Vulnerability in Swallowing Exceptions
  • Cleanup Code Vulnerability
  • Vulnerability in Re-Throwing Exception
  • Rules of Thumb for Good Exception Management
    • Page-Level Exception Handling
    • Application-Level Exception Handling
  • Handling Exception with Application_Error Event Handler
  • Handling Exception with ASP.NET Error Page Redirection Mechanism
  • Managing Unhandled Errors
  • Exposing Detailed Error Messages
  • Sensitive Information Leakage Vulnerability in Custom Error Message
  • Unobserved Exception Vulnerability
  • Exception Handling Best Practices
    • Best Practices for Coding Exceptions Safely
    • Do’s and Don’ts in Exception Handling
    • Guidelines for Proper Exception Handling
    • Error Handling Security Checklists
  • Auditing and Loggin
    • What is Logging and Auditing?
    • Need of Secure Logging and Auditing
    • Common Threats tLogging and Auditing
    • What Should be Logged?
    • What Should NOT be Logged?
    • Where tPerform Event Logging?
    • Performing Log Throttling in ASP.NET Health Monitoring System
    • Windows Event Log
  • Preventing Windows Event Log from Denial of Service Attack
  • Securing Windows Event log
  • Preventing Rogue Administrators from Tampering with Windows Event Logs
    • Centralizing Logging and Configuring its Security
    • Tracing in .NET
  • Writing Trace Output tWindows Event Log Using EventLogTraceListener
  • Auditing and Logging Best Practices
    • Tracing Security Concerns and Recommendations
    • Secure Auditing and Logging Best Practices: Protecting Log Records
    • Secure Auditing and Logging Best Practices: Fixing the Logs
    • Auditing and Logging Security Checklists
  • .NET Logging Tools
    • Apache Foundation’s log4net
    • SmartInspect
    • NLog
    • Logview4net
    • .NET Logging Tools

Module 08: .NET Secure File Handling

  • File Handling
  • System.INamespace Classes
  • Attacks on File and Its Defensive Techniques
    • Path Traversal Attack
    • Protecting Path Traversal Attack
    • Possible Methods tPrevent Path Traversal
  • Canonicalization
    • Canonicalization Attack
  • Protecting the Applications against Canonicalization Attacks
  • Securing Files
    • Securing the Static Files
    • Adding Role Checks tFile Access
    • Securing File I/from Untrusted File Input
    • Securing File I/with Absolute Path
    • Constrain File I/by Configuring Code Access Security Policy
    • Securing User-Specified Files with FileIOPermission
  • Virtual Path Mapping Using MapPath
  • Preventing Cross-Application Mapping Using MapPath
  • Validating File Names using GetFullPath
  • Securing User Uploaded Files
  • File Extension Handling
    • Active Server Pages (ASP) Directory Listing
    • Creating Directory Listing
  • Isolated Storage
    • Isolated Storage – Get Store/ Open Store
    • Isolated Storage Root Location Storage Files
    • Isolated Storage Example
  • File Access Control Lists (ACLs)
    • File ACLs
    • Required .NET Access Control Lists (ACLs)
  • Checklist for Securely Accessing Files

Module 09: .NET Configuration Management and Secure Code Review

  • Configuration Management
    • ASP.NET Configuration Files
    • ASP.NET Configuration File Model
    • ASP.NET Configuration File Locations
    • Configuration Management Threats
  • Machine Configuration File
    • Machine Configuration File: Machinconfig
    • Machinconfig Vulnerability
  • Application Configuration Files
    • Application Configuration File: Web.config
  • Web.config Vulnerabilities: Default Error Message
  • Web.config Vulnerabilities: Leaving Tracing Enabled in Web-Based Applications
  • Web.config Vulnerabilities: Leaving Debugging Enabled
  • Web.config Vulnerabilities: Cookies Accessible through Client-Side Script
  • Web.config Vulnerabilities: Enabled Cookieless Session State
  • Web.config Vulnerabilities: Enabled Cookieless Authentication
  • Web.config Vulnerabilities: Failure tRequire SSL for Authentication Cookies
  • Web.config Vulnerabilities: Using Sliding Expiration
  • Web.config Vulnerabilities: Using Non-Unique Authentication Cookie
  • Web.config Vulnerabilities: Using Hardcoded Credential
  • Web.config Vulnerabilities: Securing List-based Controls using EnableEventValidation
  • Web.config Vulnerabilities: Securing Passwords using PasswordFormat
  • Web.config Vulnerabilities: Changing Default Values of Membership Settings
  • Web.config Vulnerabilities: Securing Against XSS Attack Vulnerabilities
  • Web.config Vulnerabilities: Securing Against DoS Attack Vulnerabilities
  • Web.config Vulnerabilities: Preventing ViewState from Tampering
  • Web.config Vulnerabilities: Securing ViewState with SDL-approved Cryptographic Algorithms
  • Web.config Vulnerabilities: Securing ViewState with Strong Validation Key
  • Web.config Vulnerabilities: Securing ViewState using Encryption
  • Web.config Vulnerabilities: Selecting Right Algorithm for ViewState Encryption
  • Web.config Vulnerabilities: Deploying Application with Strong decryption Key
  • Web.config Vulnerabilities: Ignoring Validation Errors
  • Application Configuration Files: App.exconfig
  • App.exe.config Vulnerabilities
  • Code Access Security Configuration Files
    • Enterprise Policy Configuration File: enterprisesconfig
    • Machine and User Policy Configuration File: security.config
    • ASP. NET Policy Configuration Files
    • .NET Framework Configuration Tool: Mscorcfg.msc
  • Mscorcfg.msc Features
    • Code Access Security Policy Tool: Caspol.exe
  • Configuration Management Best Practices
  • Secure Code Review
    • Why Secure Code Review?
    • Security Code Review Approach
    • Step 1: Identify Security Code Review Objectives
    • Step 2: Perform Preliminary Scan
    • Step 3: Review Code for Security Issue
    • Step 4: Review for Security Issues Unique tthe Architecture
    • Static Code Analysis Tools
  • Parasoft dotTEST Microsoft FxCop StyleCop
  • NDepend
  • ReSharper