Course Outline

Introduction

  • Importance of network security in software development for government
  • Common threat landscape and attacker motivations
  • Overview of layered defense strategy and secure design principles

IT Security and Secure Coding

  • Overview of security objectives (CIA)
  • Introduction to secure software development for government
  • Common security misconceptions in coding

Network Security

  • OSI model and network vulnerabilities
  • Common attacks (DoS, spoofing, MITM, session hijacking)
  • Network security defenses and best practices for government

Practical Cryptography

  • Symmetric encryption algorithms (AES, DES)
  • Asymmetric encryption (RSA, ECC)
  • Hashing and integrity checks (SHA family)
  • Key management and Public Key Infrastructure (PKI) for government

Security Protocols

  • Introduction to cryptographic protocols
  • IPSEC: architecture, modes, and use cases
  • SSL/TLS: handshake process and secure communication
  • Common protocol pitfalls and misconfigurations for government

Cryptographic Vulnerabilities

  • Protocol-specific attacks: BEAST, CRIME, POODLE, FREAK, Logjam
  • Padding oracle attacks
  • Timing attacks (e.g., RSA timing)
  • Practical mitigations and secure usage patterns for government

Knowledge Sources

  • Secure coding standards (e.g., OWASP, CERT) for government
  • Guidelines and tools for vulnerability testing
  • Continuous learning and community resources

Summary and Next Steps

Requirements

  • Basic understanding of software development principles
  • Familiarity with networking fundamentals and the OSI model
  • Some experience with application development or system architecture

Audience

  • Developers for government
  • Software architects
  • Security engineers
  • IT professionals interested in secure application and network communication for government
 14 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories