Mshabab Alrizah

.NET, C# and ASP.NET Security Development Training Course

A special course

About the course

A number of programming languages are available today to compile code to .NET and ASP.NET frameworks. The environment provides powerful means for security development, but developers should know how to apply the architecture- and coding-level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation.

The aim of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from performing privileged actions, protect resources through strong authentication and authorization, provide remote procedure calls, handle sessions, introduce different implementations for certain functionality, and many more.

Introduction of different vulnerabilities starts with presenting some typical programming problems committed when using .NET, while the discussion of vulnerabilities of the ASP.NET also deals with various environment settings and their effects. Finally, the topic of ASP.NET-specific vulnerabilities not only deals with some general web application security challenges, but also with special issues and attack methods like attacking the ViewState, or the string termination attacks.

Participants attending this course will

  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn to use various security features of the .NET development environment
  • Get practical knowledge in using security testing tools
  • Learn about typical coding mistakes and how to avoid them
  • Get information about some recent vulnerabilities in .NET and ASP.NET
  • Get sources and further readings on secure coding practices

Evaluation and grade

no exams or tests, but there might be assignments!

Important note

This course is for professionals, and we provide it to help organizations improve the cybersecurity of their infrastructures. The schedule and other details will be proved upon request.