Course Outline
Module 1: Introduction to Software Security
• Course overview
• Course objectives
• Introduction
• Importance of software security for government operations
• Application threats and vulnerabilities relevant to public sector systems
• Definitions of software security
• Fundamentals of secure coding practices for government applications
Module 2: Common Web Application Risks (OWASP Top 10)
• A1 - Injection
1. SQL Injection
2. OS/Command Injection
3. LDAP Injection
• A2 - Broken Authentication and Session Management
1. Cross-Site Scripting (XSS)
2. Insecure Direct Object References
3. Security Misconfiguration
4. Sensitive Data Exposure
5. Data at Rest
6. Data in Transit
7. Missing Function Level Access Control
Module 3: Demo Web Application Penetration
• Educational videos
• Demonstration of vulnerability penetration for government systems
Module 4: Data Validation
• Input validation techniques
• Server-side versus client-side validation strategies
• Whitelisting and blacklisting approaches
• Output encoding and escaping methods
• Parameterized queries for enhanced security
• Utilizing frameworks and APIs for secure data handling
• Microsoft Web Protection Library
• Java Regex for pattern matching
• OWASP ESAPI validators for input validation
Module 5: Authentication
• Basic versus forms-based authentication methods
• Development of robust authentication policies for government applications
• Authorization and permissions management
Module 6: Session Management
• Strategies for protecting session IDs in public sector systems
• Prevention of session hijacking attacks
• Mitigation techniques for session fixation vulnerabilities
Module 7: Secure SDLC
• Overview of the secure software development lifecycle (SDLC) for government
• Detailed examination of a secure process
• Managerial perspectives on implementing a secure SDLC
• Developer considerations in the secure SDLC
• Consumer expectations for security in government applications
• Business responsibilities for ensuring secure software development
• Key phases of the development lifecycle and their security implications
Requirements
Testimonials (5)
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
Course - Secure Developer Java (Inc OWASP)
Module3 Applications Attacks and Exploits, XSS, SQL injection Module4 Servers Attacks and Exploits, DOS, BOF
Tshifhiwa - Vodacom
Course - How to Write Secure Code
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
Course - Secure Developer .NET (Inc OWASP)
Nothing it was perfect.