Implementing a secure networked application can be challenging, even for developers who have previously worked with various cryptographic components like encryption and digital signatures. To ensure participants grasp the role and usage of these cryptographic primitives, the course begins by laying a solid foundation on the core requirements of secure communication—secure acknowledgment, integrity, confidentiality, remote identification, and anonymity. It also highlights typical issues that can compromise these requirements along with real-world solutions.
Given that cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are discussed. Rather than delving into complex mathematical theories, these elements are presented from a developer's perspective, focusing on practical use-case examples and considerations related to implementing cryptographic solutions, such as public key infrastructures. The course also introduces security protocols across various secure communication areas, with an in-depth look at widely-used protocol families like IPSEC and SSL/TLS.
The discussion includes typical vulnerabilities associated with specific crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and similar attacks. Each vulnerability is explained in terms of practical considerations and potential consequences, without getting into detailed mathematical explanations.
Since XML technology plays a central role in data exchange for networked applications, the course covers the security aspects of XML. This includes the use of XML in web services and SOAP messages, along with protection measures like XML signature and XML encryption. It also addresses weaknesses in these protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Grasp the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Gain a practical understanding of cryptography
- Comprehend essential security protocols
- Understand recent attacks against cryptosystems
- Receive information on recent related vulnerabilities
- Understand the security concepts of Web services
- Access sources and further readings on secure coding practices
Audience
Developers, Professionals
Read more...