Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Importance of network security in software development for government
- Common threat landscape and attacker motivations
- Overview of layered defense strategy and secure design principles
IT Security and Secure Coding
- Overview of security objectives (CIA)
- Introduction to secure software development for government
- Common security misconceptions in coding
Network Security
- OSI model and network vulnerabilities
- Common attacks (DoS, spoofing, MITM, session hijacking)
- Network security defenses and best practices for government
Practical Cryptography
- Symmetric encryption algorithms (AES, DES)
- Asymmetric encryption (RSA, ECC)
- Hashing and integrity checks (SHA family)
- Key management and Public Key Infrastructure (PKI) for government
Security Protocols
- Introduction to cryptographic protocols
- IPSEC: architecture, modes, and use cases
- SSL/TLS: handshake process and secure communication
- Common protocol pitfalls and misconfigurations for government
Cryptographic Vulnerabilities
- Protocol-specific attacks: BEAST, CRIME, POODLE, FREAK, Logjam
- Padding oracle attacks
- Timing attacks (e.g., RSA timing)
- Practical mitigations and secure usage patterns for government
Knowledge Sources
- Secure coding standards (e.g., OWASP, CERT) for government
- Guidelines and tools for vulnerability testing
- Continuous learning and community resources
Summary and Next Steps
Requirements
- Basic understanding of software development principles
- Familiarity with networking fundamentals and the OSI model
- Some experience with application development or system architecture
Audience
- Developers for government
- Software architects
- Security engineers
- IT professionals interested in secure application and network communication for government
14 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.