AWA 601: Information and Application Security Awareness

Live Training English
Course is offered in English

Course Overview

This course begins by describing the CIA (Confidentiality, Integrity, Availability) triad and specifically, what it means in an application security context. It then examines the root cause of software vulnerabilities, how attackers view your applications, the true cost of software vulnerabilities, and how to integrate security into your development and IT organizations. To illustrate real world situations, the instructor will conduct live demonstration exercises. 

Upon completion of this class, participants will be able to understand:

  • The difference between functional and security bug
  • How applications are attacked, how to identify assets, entry points and attack vectors, and how to leverage tools and techniques to exploit vulnerabilities
  • Threats to applications and countermeasures that can be applied during development to mitigate them

Modules Covered

What is Security?

This module presents the CIA (Confidentiality, Integrity, Availability) model and discusses how to define security and secure systems.

Why Does Security Matter?

Vulnerabilities have real costs and consequences to customers and organizations. This module describes the reliance of businesses and critical systems on software and explores the consequences of failure.

Thinking Like an Attacker

In order to adequately design, build, and defend applications, it is necessary to understand how to think like an attacker. This module presents the thought process and techniques that attackers use to break software applications.

Security and the Software Development Lifecycle (SDLC)

Security is more than just a technology problem – and spans policy, procedure, and people. This module describes best practices for integrating security into the organization and building culture of security. It will also demonstrate that most security problems are not in security-specific components, but rather they are errors in general software routines and functions.

Case Studies

In this module, the instructor will walk students through recent data breaches where application security vulnerabilities have resulted in huge financial losses. More importantly, they will examine root causes and describe defensive countermeasures that could have helped to prevent and/or reduce the impact of the breaches. These studies look beyond IT disruption and into broader consequences such as impact on stock value, remediation expense, reputation loss, liability, etc.

Attacks and Defenses

This module examines the threats that can be mitigated at the network layer, as opposed to those that must be addressed in software. This module also covers broad classes of attack tools (black box, white box, and gray box).