Course Outline

Module 1: Introduction to Software Security
• Course overview
• Course objectives
• Introduction
• Importance of software security for government operations
• Application threats and vulnerabilities relevant to public sector systems
• Definitions of software security
• Fundamentals of secure coding practices for government applications

Module 2: Common Web Application Risks (OWASP Top 10)

• A1 - Injection
1. SQL Injection
2. OS/Command Injection
3. LDAP Injection

• A2 - Broken Authentication and Session Management
1. Cross-Site Scripting (XSS)
2. Insecure Direct Object References
3. Security Misconfiguration
4. Sensitive Data Exposure
5. Data at Rest
6. Data in Transit
7. Missing Function Level Access Control

Module 3: Demo Web Application Penetration
• Educational videos
• Demonstration of vulnerability penetration for government systems

Module 4: Data Validation
• Input validation techniques
• Server-side versus client-side validation strategies
• Whitelisting and blacklisting approaches
• Output encoding and escaping methods
• Parameterized queries for enhanced security
• Utilizing frameworks and APIs for secure data handling
• Microsoft Web Protection Library
• Java Regex for pattern matching
• OWASP ESAPI validators for input validation

Module 5: Authentication
• Basic versus forms-based authentication methods
• Development of robust authentication policies for government applications
• Authorization and permissions management

Module 6: Session Management
• Strategies for protecting session IDs in public sector systems
• Prevention of session hijacking attacks
• Mitigation techniques for session fixation vulnerabilities

Module 7: Secure SDLC
• Overview of the secure software development lifecycle (SDLC) for government
• Detailed examination of a secure process
• Managerial perspectives on implementing a secure SDLC
• Developer considerations in the secure SDLC
• Consumer expectations for security in government applications
• Business responsibilities for ensuring secure software development
• Key phases of the development lifecycle and their security implications

Requirements

• Proficiency in a programming language (Java, .NET, PHP) for government applications. • Understanding of web technologies to support digital government services. • Familiarity with database management systems (Oracle, MySQL, MSSQL) for efficient data handling and reporting in government contexts.
 21 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories