Search

Search

Cyber and Secured Programming – Guidelines, Considerations & Techniques

Cyber and Secured Programming - Guidelines, Considerations & Techniques

Main Speaker:

Tracks:

Code

Seminar Catgories:

Back-end
Front-end

Course ID:

42103

Date:

19.11.2019

Time:

Daily seminar
9:00-16:30

Add to Calendar 19.11.2019 09:00 19.11.2019 16:30 Asia/Jerusalem Cyber and Secured Programming - Guidelines, Considerations & Techniques

Secured programming is critical when developing server side systems today. Hacking and exploiting data is the “New Age Terror” and can lead to horrible results starting with stealing private data up to taking a whole system down (Banking services?  Military? Health care?).

Security must be provided in all layers of hardware and software since a tiny crack is enough to sink the whole ship…. Therefore, secured code means securing everything we develop, administer and configure.

This seminar explores the need, types of attacks and assumptions we must follow to keep our code secured

Overview

Secured programming is critical when developing server side systems today. Hacking and exploiting data is the “New Age Terror” and can lead to horrible results starting with stealing private data up to taking a whole system down (Banking services?  Military? Health care?).

Security must be provided in all layers of hardware and software since a tiny crack is enough to sink the whole ship…. Therefore, secured code means securing everything we develop, administer and configure.

This seminar explores the need, types of attacks and assumptions we must follow to keep our code secured

Prerequisites

Software Developers, Managers, Architects and Project Managers that want to secure their systems and have a better understanding of the threats of today.

Course Contents

● Introduction
● Developing secured C/C++ code – principles
● Input and output validation
● Error & exception handling
● SQL & Securing DB
● Cryptography & Packers
● Intel SGX (Software Guard Extensions) & side channel attack
● Authentication mechanisms
● PE format
● Memory manipulation
● Code Injection & Hooking



Contact