Computer Hacking for Programmer

Available Upon Request
Book Your Seat Today!

Kindly advise me your company detail and our consultant will contact you soonest!

Course Objectives

Lays the foundation required by all application developers and development organizations to produce applications with greater stability and posing lesser security risks to the consumer. To standardizes the knowledge base for application development by incorporating the best practices followed by experienced experts in the various domains.

Description

The course will expose the aspirant to various programming languages from a security perspective. This drives greater appreciation for the platform / architecture / language one specializes on as well as an overview on related ones.

Target Audience

Programmers who are responsible for designing and building secure Windows/Web based applications with .NET/Java Framework.

Training Outline

Modules
  • Module 1: Introduction to Secure Coding
  • Module 2: Designing Secure Architecture
  • Module 3: Cryptography
  • Module 4: Buffer Overflows
  • Module 5: Secure C and C++ Programming
  • Module 6: Secure Java and JSP Programming
  • Module 7: Secure Java Script and VB Script Programming
  • Module 8: Secure ASP Programming
  • Module 9: Secure Microsoft.NET Programming
  • Module 10: Secure PHP Programming
  • Module 11: Secure PERL Programming
  • Module 12: Secure XML, Web Services and AJAX Programming
  • Module 13: Secure RPC, ActiveX and DCOM Programming
  • Module 14 Secure Linux Programming
  • Module 15: Secure Linux Kernel Programming
  • Module 16: Secure Xcode Programming
  • Module 17: Secure Oracle PL/SQL Programming
  • Module 18: Secure SQL Server Programming
  • Module 19: Secure Network Programming
  • Module 20: Windows Socket Programming
  • Module 21: Writing Shellcodes
  • Module 22: Writing Exploits
  • Module 23: Programming Port Scanners and Hacking Tools
  • Module 24: Secure Mobile phone and PDA Programming
  • Module 25: Secure Game Designing
  • Module 26: Securing E-Commerce Applications
  • Module 27: Software Activation, Piracy Blocking and Automatic Updates
  • Module 28: Secure Application Testing
  • Module 29: Writing Secure Documentation and Error Messages

Prerequisite

It is designed for developers who have C#, C++, Java, PHP, ASP, .NET and SQL development skills.