Font size:

The Microsoft .NET Framework is widely used to produce a variety of application types. Developers employing this framework should be aware of how to secure .NET applications and protect them from potential risks. In this course, you will explore how to develop secure .NET applications and protect against common risks.

Learning Objectives
  • Start the course
  • Identify the key features of security in the .NET Framework
  • Describe how authentication works in .NET
  • Recognize the key features of Secure coding in the .NET Framework
  • List and describe the key .NET security namespaces
  • Define what the Microsoft Secure Development Lifecycle or SDL is
  • Configure permissions for role-based security
  • Demonstrate how to use the WindowsPrincipal object in .NET
  • Recognize the purpose of replacing Principal objects
  • Compare GenericPrincipal and GenericIdentity objects
  • Describe how impersonation works in .NET
  • Use imperative security checks in .NET
  • Recognize the main features of Code Access Security or CAS
  • Demonstrate how to use transparency as an enforcement mechanism
  • Configure your .NET application to use partially trusted code
  • Identify the relationship between link demands and Code Access Security or CAS
  • Configure Code Access Security in a .NET application
  • Recognize the main features of the .NET cryptography model
  • Configure data encryption using keys
  • Recognize the process for encrypting and decrypting data
  • Specify how to use hash codes in a .NET application
  • Identify common threats to .NET applications
  • List and describe common security tools to be used with .NET
  • Create secure ASP.NET web forms
  • Demonstrate how to secure access to a data source
  • Use secure coding techniques to create a .NET application
Register Now
Securing .NET Programming Online course
  • Course ID:
  • Duration:
    110 minutes
  • Price: