Course Outline
IT Security and Secure Coding for Government
- Overview of information security principles for government
- CIA triad: Confidentiality, Integrity, Availability in a public sector context
- Common threats and threat modeling specific to government systems
- Best practices for secure software development lifecycle (SSDLC) for government applications
Web Application Security for Government
- Understanding OWASP Top Ten and beyond in the context of government web applications
- Authentication and session management flaws specific to public sector platforms
- Injection vulnerabilities (SQL, Command, LDAP, etc.) in government systems
- Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) in government web applications
Client-Side Security for Government
- DOM-based attacks and JavaScript-specific risks in government web interfaces
- Insecure use of AJAX and browser storage in public sector applications
- Clickjacking and UI redressing in government web services
- Content Security Policy (CSP) implementation for government websites
Practical Cryptography for Government
- Basic concepts: hashing, encryption, digital signatures in a public sector context
- Public key vs. symmetric key cryptography for government data protection
- Transport Layer Security (TLS) basics for secure government communications
- Key management and common crypto mistakes in government systems
Security of Web Services for Government
- SOAP and REST security considerations for government web services
- Authentication mechanisms: OAuth, JWT, API keys for secure government APIs
- Common web service attacks and defenses in the public sector
- Input validation in service payloads for government applications
XML Security for Government
- XML injection and parsing attacks specific to government systems
- Entity expansion and XXE vulnerabilities in public sector XML processing
- Secure parsing techniques and libraries for government use
- Using XML Security standards (XML-DSig, XML-Enc) in government applications
Knowledge Sources and Security Tools for Government
- Recommended tools for security testing (e.g., OWASP ZAP, Burp Suite) for government agencies
- Code scanning and analysis tools suitable for public sector development
- Online resources and security guidelines for government IT professionals
- How to stay updated with emerging threats relevant to the public sector
Summary and Next Steps for Government
Requirements
- An understanding of basic web application architecture for government use
- Experience with a programming language such as Java, C#, PHP, or JavaScript
- Familiarity with client-server communication and HTTP
Audience
- Developers for government projects
- Web application architects for government systems
- Security-conscious technical teams for government operations
Testimonials (5)
Overview of most among important topics related to software architecture. This training inspired me to learn some of them in depth ;)
Konrad Fuchsig - EY GDS
Course - Web Application Security
Explanation of the concepts I had no knowledge about. Tutors calm and kind attitude and also his very vast knowledge.
Michal Kowalczyk - EY GDS
Course - Web Application Security
Practical examples and possibility to try how web injections are functioning from the other side - not user but attacker side.
Jessica Wierzbicka - EY GDS
Course - Web Application Security
The hands-on labs were excellent.
Dr. Farhan Hassan Khan - TDM GROUP
Course - Web Application Security
Trainers command in his field