Get in Touch

Course Outline

IT Security and Secure Coding Foundations

  • Threat modeling fundamentals: STRIDE, attack surfaces, and privilege escalation vectors
  • Secure SDLC integration: shifting left, threat-aware design reviews, and defense-in-depth
  • Principle of least privilege, defense by contract, and secure default configurations
  • Workshop: Mapping a .NET microservice to a threat model and identifying architectural controls

Web Application Security in ASP.NET

  • ASP.NET request pipeline, middleware execution order, and filter interception points
  • HTTP protocol risks: header injection, request smuggling, and CORS misconfigurations
  • Session management, state persistence, and cookie security best practices
  • Secure remote procedure calls and external API consumption patterns
  • Lab: Exploiting and patching a vulnerable middleware chain in a sample ASP.NET app

.NET Security Architecture and Built-in Services

  • CLR security model: evidence, permissions, and CAS (Code Access Security) evolution
  • ASP.NET Core Identity, authentication schemes, and token-based security (JWT, OAuth2, OpenID Connect)
  • Data Protection API: encryption, key rotation, and secure data serialization
  • Cryptographic primitives in .NET: RNG, hashing, symmetric/asymmetric encryption, and signature validation
  • Lab: Implementing secure token issuance, key rotation, and data protection across a microservice boundary

Common Coding Errors, Vulnerabilities, and Mitigation

  • Deserialization attacks, ViewState tampering, and string termination/overflow pitfalls in .NET
  • Configuration drift: web.config/appsettings.json, environment variable exposure, and secret management
  • Injection vectors: SQL, command, XSS, and LDAP in C# data access and routing
  • Insecure defaults, hardcoding, and improper error handling leading to information leakage
  • Lab: Reverse-engineering a vulnerable .NET module, applying secure patterns, and validating fixes with static/dynamic analyzers

Security Testing, Validation, and Continuous Improvement

  • Static Application Security Testing (SAST): Roslyn analyzers, Security Code Scan, and CI/CD integration
  • Dynamic Application Security Testing (DAST): OWASP ZAP, Burp Suite workflows, and automated scanning
  • Runtime protection: Application Guardrails, memory safety practices, and secure logging/auditing
  • Patch management, dependency tracking, and responding to .NET/ASP.NET security advisories
  • Lab: Building a pre-commit and pipeline security gate for a .NET solution

Knowledge Sources and Secure Development Ecosystem

  • Official Microsoft security guidance, .NET security docs, and ASP.NET hardening references
  • CVE databases, advisory feeds, and responsible disclosure workflows for open-source dependencies
  • Secure library ecosystems: PGP, crypto-ops, authentication scaffolds, and compliant cryptography
  • Building internal secure coding standards, developer enablement, and security champion programs
  • Workshop: Curating a personalized secure development toolkit and establishing ongoing monitoring practices

Requirements

  • Solid working knowledge of C# programming and .NET framework fundamentals
  • Familiarity with ASP.NET web development (Razor Pages, MVC, or Minimal APIs)
  • Understanding of basic HTTP, routing, and web server concepts
  • No prior security certification required, but production coding experience is expected
 14 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories