Course Outline

Introduction

  • Importance of network security in software development
  • Common threat landscape and attacker motivations
  • Overview of layered defense strategy and secure design principles

IT Security and Secure Coding

  • Overview of security objectives (CIA)
  • Introduction to secure software development
  • Common security misconceptions in coding

Network Security

  • OSI model and network vulnerabilities
  • Common attacks (DoS, spoofing, MITM, session hijacking)
  • Network security defenses and best practices

Practical Cryptography

  • Symmetric encryption algorithms (AES, DES)
  • Asymmetric encryption (RSA, ECC)
  • Hashing and integrity checks (SHA family)
  • Key management and Public Key Infrastructure (PKI)

Security Protocols

  • Introduction to cryptographic protocols
  • IPSEC: architecture, modes, and use cases
  • SSL/TLS: handshake process and secure communication
  • Common protocol pitfalls and misconfigurations

Cryptographic Vulnerabilities

  • Protocol-specific attacks: BEAST, CRIME, POODLE, FREAK, Logjam
  • Padding oracle attacks
  • Timing attacks (e.g., RSA timing)
  • Practical mitigations and secure usage patterns

Knowledge Sources

  • Secure coding standards (e.g., OWASP, CERT)
  • Guidelines and tools for vulnerability testing
  • Continuous learning and community resources

Summary and Next Steps

Requirements

  • Basic understanding of software development principles
  • Familiarity with networking fundamentals and OSI model
  • Some experience with application development or system architecture

Audience

  • Developers
  • Software architects
  • Security engineers
  • IT professionals interested in secure application and network communication
 14 Hours

Testimonials (1)

Related Categories