
Implementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification and anonymity.
Interested in attending? Have a suggestion about running this event near you?
Register your interest now
Description
Outline
- IT security and secure coding
- Requirements of secure communication
- Network security
- Practical cryptography
- Security protocols
- Cryptographic vulnerabilities
- Common coding errors and vulnerabilities
- Knowledge sources
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Learn about typical coding mistakes and how to avoid them
- Get information about some recent vulnerabilities in the Java framework
- Learn about XML security
- Get information about some recent related vulnerabilities
- Get sources and further readings on secure coding practices
Day 1
- IT security and secure coding
- Requirements of secure communication
- Network security
Day 2
- Network security
- Practical cryptography
Day 3
- Cryptographic vulnerabilities
- Common coding errors and vulnerabilities
Audience
Developers & Professionals
Prerequisites
Network engineering, general software development