Overview
The C# Developer Learning Path includes a variety of security courses that will vary depending on whether you are seeking core, advanced or elite paths. It builds a thorough grounding of security features necessary to develop modern applications that run on desktops or back-end processes powering modern web applications.
Concepts covered:
- Defensive coding best practices
- Developing scalable applications using multithreading features of .NET framework
- Avoiding common pitfalls
- AWA 101 – Fundamentals of Application Security
- AWA 102 – Secure Software Concepts
- COD 102 – The Role of Software Security
- COD 103 – Creating Software Security Requirements
- COD 104 – Designing Secure Software
- COD 105 – Secure Software Development
- COD 106 – The Importance of Software Integration and Testing
- COD 107 – Secure Software Deployment
- COD 108 – Software Operations and Maintenance
- DES 101 – Fundamentals of Secure Architecture
- COD 216 – Leveraging .NET Framework Code Access Security (CAS)
- COD 217 – Mitigating .NET Security Threats
- DES 204 – Role of Cryptography in Application Development
- DES 207 – Mitigating OWASP API Security Top 10
- DES 212 – Architecture Risk Analysis & Remediation
- DES 237 – Mitigating OWASP 2021 Security Misconfiguration
- DES 281 – OWASP IoT1: Mitigating Weak, Guessable or Hardcoded Passwords
- DES 282 – OWASP IoT2: Mitigating Insecure Network Services
- DES 283 – OWASP IoT3: Mitigating Insecure Ecosystem Interfaces
- DES 284 – OWASP IoT4: Mitigating Lack of Secure Update Mechanism
- DES 285 – OWASP IoT5: Mitigating Use of Insecure or Outdated Components
- DES 286 – OWASP IoT6: Mitigating Insufficient Privacy Protection
- DES 287 – OWASP IoT7: Mitigating Insecure Data Transfer and Storage
- DES 288 – OWASP IoT8: Mitigating Lack of Device Management
- DES 289 – OWASP IoT9: Mitigating Insecure Default Settings
- DES 290 – OWASP IoT10 Mitigating Lack of Physical Hardening
- ENG 205 – Fundamentals of Threat Modeling
- ENG 211 – How to Create Application Security Design Requirements
- ENG 212 – Implementing Secure Software Operations
- LAB 221 – Defending C# Applications Against SQL Injection
- LAB 232 – Defending C# Applications Against XSS
- LAB 238 – Defending C# Applications Against Weak AES ECB Mode Encryption
- LAB 239 – Defending C# Applications Against Weak PRNG
- LAB 241 – Defending C# Applications Against eXternal XML Entity (XXE) Vulnerabilities
- LAB 250 – Defending C# Applications Against Parameter Tampering
- LAB 251 – Defending C# Applications Against Plaintext Password Storage
- LAB 260 – Defending C# Applications Against Sensitive Information in Error Messages
- LAB 266 – Defending C# Applications Against Sensitive Information in Log Files (NEW)
- LAB 270 – Defending C# Applications Against Deserialization of Untrusted Data (NEW)
- LAB 274 – Defending C# Applications Against SSRF (NEW)
- COD 308 – Common ASP.NET MVC Vulnerabilities and Attacks
- COD 309 – Securing ASP.NET MVC Applications
- COD 321 – Protecting C# from Integer Overflows & Canonicalization
- COD 322 – Protecting C# from SQL Injection
- COD 323 – Using Encryption with C#
- COD 324 – Protecting C# from XML Injection
- DES 311 – Creating Secure Application Architecture
- DSO 307 – Secure Secrets Management
- ENG 312 – How to Perform a Security Code Review
- SDT 325 – Testing for NULL Pointer Dereference
Learning Path Details
Number of Courses: 50
Number of Labs: 17
Total Duration: 15 Hours
Total CPE Credits: 18