SESSION 1
Overview of Security in .NET
- Security as a System
- Security in .NET
- Designing Secure Systems
Security
Administration
- Security Policy in the CLR
- Configuring Policy
SESSION 2
Security Administration (continued)
- Working with Command Line Tools
- Other Security Tools
Creating Secure Assemblies
- Assembly Overview
- Exception Handling
- Protecting Source Code
- Coding Best Practices
Digging into Code Access Security
SESSION 3
Digging into Code Access Security (continued)
- Permission Requests (continued)
- Determining Effective
Permissions
Understanding and Using Windows Security
- Windows Security Basics
- DACLs and .NET
Role-Based Security for Windows Applications
- Role-Based Security Overview
- .NET Security Classes
- Implementing Application Security
SESSION 4
Role-Based Security for Windows Applications
(continued)
- Implementing Application Security (continued)
Isolated Storage
- Understanding Isolated Storage
- Mechanics of Isolated Storage
- Types of Isolation
- Administering Isolated Storage
SESSION 5
Securing SQL Server Data
- Installing SQL Server
- SQL Server in Visual Studio .NET
- SQL Server Security Architecture
SESSION 6
ASP.NET Security
- ASP.NET Security Overview
- Windows Authentication
- Forms Authentication
SESSION 7
ASP.NET Security (continued)
Enterprise Services
- Enterprise Services Overview
SESSION 8
Enterprise Services (continued)
- Creating Serviced Components
- Administering COM+ Security
- Testing the Inventory Application
Security for .NET Remoting
- .NET Remoting Overview
- Hosting Remoting in ASP.NET
SESSION 9
Security for .NET Remoting (continued)
- Secure Remoting with IIS and ASP.NET
Web Services
- Web Services Overview
- Disabling Unwanted Protocols
- Secure Web Services with IIS and ASP.NET
SESSION 10
Web Services (continued)
- Secure Web Services with IIS and ASP.NET (cont.)
Deployment
- Deploying Security Policy
- No-Touch Deployment
- .NET Deployment Options
- Deploying ASP.NET Applications
Cryptography in .NET
- Basic Cryptographic Concepts
- Working with Data
SESSION 11
Cryptography in .NET (continued)
- Using Asymmetric Cryptography
- Hash Codes
- Digital Signatures
- Creating Random Keys
Handling Common Threats
- Thinking About Security
- Buffer Overflows
- SQL Injection
- Cross-Site Scripting
- Keeping Current
- The Human Element
|