Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Importance of network security in software development
- Common threat landscape and attacker motivations
- Overview of layered defense strategy and secure design principles
IT Security and Secure Coding
- Overview of security objectives (CIA)
- Introduction to secure software development
- Common security misconceptions in coding
Network Security
- OSI model and network vulnerabilities
- Common attacks (DoS, spoofing, MITM, session hijacking)
- Network security defenses and best practices
Practical Cryptography
- Symmetric encryption algorithms (AES, DES)
- Asymmetric encryption (RSA, ECC)
- Hashing and integrity checks (SHA family)
- Key management and Public Key Infrastructure (PKI)
Security Protocols
- Introduction to cryptographic protocols
- IPSEC: architecture, modes, and use cases
- SSL/TLS: handshake process and secure communication
- Common protocol pitfalls and misconfigurations
Cryptographic Vulnerabilities
- Protocol-specific attacks: BEAST, CRIME, POODLE, FREAK, Logjam
- Padding oracle attacks
- Timing attacks (e.g., RSA timing)
- Practical mitigations and secure usage patterns
Knowledge Sources
- Secure coding standards (e.g., OWASP, CERT)
- Guidelines and tools for vulnerability testing
- Continuous learning and community resources
Summary and Next Steps
Requirements
- Basic understanding of software development principles
- Familiarity with networking fundamentals and OSI model
- Some experience with application development or system architecture
Audience
- Developers
- Software architects
- Security engineers
- IT professionals interested in secure application and network communication
14 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.