Search

Search

Cyber and Secured Programming – Guidelines, Considerations & Techniques

Cyber and Secured Programming - Guidelines, Considerations & Techniques

Main Speaker:


Saar Peled

Tracks:

Code

Seminar Catgories:

Back-end
Front-end

Course ID:

18420

Date:

26.11.2018

Time:

Daily seminar
9:00-16:30

Add to Calendar 26.11.2018 09:00 26.11.2018 16:30 Asia/Jerusalem Cyber and Secured Programming - Guidelines, Considerations & Techniques

Secured programming is critical when developing server side systems today. Hacking and exploiting data is the “New Age Terror” and can lead to horrible results starting with stealing some-ones private data up to taking a whole system down ( Banking service?  Military? ).

Security must be provides in all layers of hardware and software since a single hole is enough to sink the whole ship…. Therefore, secured code means securing everything we develop, administrate and configure.

This seminar explores the need, types of attacks and assumptions we must follow to keep our code secured

Overview

Secured programming is critical when developing server side systems today. Hacking and exploiting data is the “New Age Terror” and can lead to horrible results starting with stealing some-ones private data up to taking a whole system down ( Banking service?  Military? ).

Security must be provides in all layers of hardware and software since a single hole is enough to sink the whole ship…. Therefore, secured code means securing everything we develop, administrate and configure.

This seminar explores the need, types of attacks and assumptions we must follow to keep our code secured

Prerequisites

Managers, architects and project managers that want to secure their systems and have a better understanding of the threats of today.

Course Contents

  • Introduction
  • Common Web Apps Threats
  • Developing secured code – principles
  • Web server & client hardening
  • HTML related security issues
  • Input and output validation
  • Error & exception handling
  • Secured logging
  • Securing DB and SQL
  • Handling information disclosure
  • Cryptography
  • Security design patterns
  • Authentication mechanisms


Contact