Defensive Programming

How can I ensure that I write bullet proof code that repels hackers?

Target Audience

Developers, Programmers, Architects with experience in any scripting/programming languages.

Topics

  • The Forrest Rabbit Analogy
  • Disclaimer and Responsible activities
  • The defensive programming principles
  • The OWASP foundation and projects
  • Understanding the common application security risks
  • A quick overview of Injection Attacks
  • Protecting queries against database
  • Input Validationo Whitelistingo Blacklistingo Regex basedo Type casting based
  • Encoding and Decodingo Url Encodingo Base64 Encodingo Output Encoding and types
  • Cryptographyo Encryption and Decryptiono Hashing
  • Secure Failovers and Logging
  • Protecting Data during transit and storageo HTTPSo File Storage
  • HTTP Header based security and recent advancements
  • Securing the configurations
  • Types of Authentication
  • Secure Account Managemento Password storageo Protecting user identitieso Secure Reset functionalitieso Securely logging off
  • Prevention against automated attackso CAPTCHAo OTPo Randomised tokens
  • Cookie securityo Session Managemento Time Outs
  • A quick look at the defensive programming cheatsheet

Outcome

  • Intermediate level of knowledge to protect applications and fix security flaws
  • In-depth understanding of all the defensive programming techniques and principles
  • Brief overview of testing applications for vulnerabilities
  • Ability to identify internet resources to enable fast learning
  • Practical, hands on, and real world workshop enables learning by actually coding
  • Being able to recognize patters and common vulnerabilities

Duration

2 days

Date and cost

In consultation

Trainers

Marudhamaran Gunasekaran

0

Start typing and press Enter to search