Course Outline
Module 1: Introduction to Software Security
• Course overview
• Course objectives
• Introduction
• Importance of software security for government operations
• Application threats and vulnerabilities relevant to public sector systems
• Definitions of software security
• Fundamentals of secure coding practices for government applications
Module 2: Common Web Application Risks (OWASP Top 10)
• A1 - Injection
1. SQL Injection
2. OS/Command Injection
3. LDAP Injection
• A2 - Broken Authentication and Session Management
1. Cross-Site Scripting (XSS)
2. Insecure Direct Object References
3. Security Misconfiguration
4. Sensitive Data Exposure
5. Data at Rest
6. Data in Transit
7. Missing Function Level Access Control
Module 3: Demo Web Application Penetration
• Educational videos
• Demonstration of vulnerability penetration for government systems
Module 4: Data Validation
• Input validation techniques
• Server-side versus client-side validation strategies
• Whitelisting and blacklisting approaches
• Output encoding and escaping methods
• Parameterized queries for enhanced security
• Utilizing frameworks and APIs for secure data handling
• Microsoft Web Protection Library
• Java Regex for pattern matching
• OWASP ESAPI validators for input validation
Module 5: Authentication
• Basic versus forms-based authentication methods
• Development of robust authentication policies for government applications
• Authorization and permissions management
Module 6: Session Management
• Strategies for protecting session IDs in public sector systems
• Prevention of session hijacking attacks
• Mitigation techniques for session fixation vulnerabilities
Module 7: Secure SDLC
• Overview of the secure software development lifecycle (SDLC) for government
• Detailed examination of a secure process
• Managerial perspectives on implementing a secure SDLC
• Developer considerations in the secure SDLC
• Consumer expectations for security in government applications
• Business responsibilities for ensuring secure software development
• Key phases of the development lifecycle and their security implications
Requirements
Testimonials (5)
The trainer provided up-to-date information and valuable references and tools.
Jose Vicente - EID
Course - C/C++ Secure Coding
Nothing it was perfect.
Zola Madolo - Vodacom
Course - Android Security
The labs
Katekani Nkuna - Vodacom
Course - The Secure Coding Landscape
Trainer willing to answer questions and give bunch of examples for us to learn.
Eldrick Ricamara - Human Edge Software Philippines, Inc. (part of Tribal Group)
Course - Security Testing
It opens up a lot and gives lots of insight what security