Course Outline
IT Security and Secure Coding Foundations for Government
- Core principles of security and defense in depth
- Recent trends in vulnerabilities and exploits
- Secure software development lifecycle (SSDLC) integration
Web Application Security for Government
- OWASP Top Ten (2021) and beyond
- Injection, broken authentication, insecure deserialization
- Secure session and token management
Client-Side Security for Government
- Cross-Site Scripting (XSS) and DOM-based attacks
- Cross-Site Request Forgery (CSRF)
- Modern client-side frameworks and supply chain risks
Foundations of Java Security for Government
- Java security architecture and sandboxing
- Secure use of Java APIs and libraries
- Mitigating deserialization vulnerabilities
Practical Cryptography for Government
- Hashing, encryption, and digital signatures
- Using Java Cryptography Architecture (JCA)
- Key management and secure communication with TLS
Java Security Services for Government
- Authentication and authorization with JAAS
- Spring Security overview
- Secure web services and APIs with Java
C/C++ Security and Memory Safety for Government
- Memory layout and stack operations
- Buffer overflows, format string attacks, and dangling pointers
- Mitigation techniques: ASLR, DEP, stack canaries
Common Coding Errors and Vulnerabilities for Government
- Injection flaws in C/C++ and Java
- Improper error handling and logging
- Insecure file and resource management
Knowledge Sources and Best Practices for Government
- Staying updated on CVEs, advisories, and frameworks
- Static and dynamic analysis tools for secure coding
- Further readings and resources for continuous learning
Summary and Next Steps for Government
Requirements
- Familiarity with C/C++, Java, and web application development for government projects
- Basic understanding of networking and HTTP protocols
- Experience using an Integrated Development Environment (IDE) or code editor
Audience
- Developers for government agencies
- Software engineers for government systems
- Technical leads in public sector organizations
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
Very good to understand how a hacker would potentially analyse sites for weakness and tools they might employ .