Get in Touch

Course Outline

Foundations of IT Security and Secure Coding

  • Fundamentals of threat modeling: STRIDE, attack surfaces, and privilege escalation vectors
  • Integrating security into the SDLC: shifting left, threat-aware design reviews, and defense-in-depth
  • Principles of least privilege, defense by contract, and secure default configurations
  • Workshop: Mapping a .NET microservice to a threat model and identifying architectural controls

Web Application Security in ASP.NET

  • The ASP.NET request pipeline, middleware execution order, and filter interception points
  • HTTP protocol risks: header injection, request smuggling, and CORS misconfigurations
  • Best practices for session management, state persistence, and cookie security
  • Secure remote procedure calls and patterns for consuming external APIs
  • Lab: Exploiting and patching a vulnerable middleware chain in a sample ASP.NET application

.NET Security Architecture and Built-in Services

  • CLR security model: evidence, permissions, and the evolution of CAS (Code Access Security)
  • ASP.NET Core Identity, authentication schemes, and token-based security (JWT, OAuth2, OpenID Connect)
  • Data Protection API: encryption, key rotation, and secure data serialization
  • Cryptographic primitives in .NET: RNG, hashing, symmetric/asymmetric encryption, and signature validation
  • Lab: Implementing secure token issuance, key rotation, and data protection across a microservice boundary

Common Coding Errors, Vulnerabilities, and Mitigation

  • Deserialization attacks, ViewState tampering, and string termination/overflow pitfalls in .NET
  • Configuration drift: web.config/appsettings.json, environment variable exposure, and secret management
  • Injection vectors: SQL, command, XSS, and LDAP in C# data access and routing
  • Insecure defaults, hardcoded values, and improper error handling leading to information leakage
  • Lab: Reverse-engineering a vulnerable .NET module, applying secure patterns, and validating fixes with static/dynamic analyzers

Security Testing, Validation, and Continuous Improvement

  • Static Application Security Testing (SAST): Roslyn analyzers, Security Code Scan, and CI/CD integration
  • Dynamic Application Security Testing (DAST): OWASP ZAP, Burp Suite workflows, and automated scanning
  • Runtime protection: Application Guardrails, memory safety practices, and secure logging/auditing
  • Patch management, dependency tracking, and responding to .NET/ASP.NET security advisories
  • Lab: Building a pre-commit and pipeline security gate for a .NET solution

Knowledge Sources and Secure Development Ecosystem

  • Official Microsoft security guidance, .NET security documentation, and ASP.NET hardening references
  • CVE databases, advisory feeds, and responsible disclosure workflows for open-source dependencies
  • Secure library ecosystems: PGP, crypto-ops, authentication scaffolds, and compliant cryptography
  • Establishing internal secure coding standards, developer enablement, and security champion programs
  • Workshop: Curating a personalized secure development toolkit and establishing ongoing monitoring practices

Requirements

  • Strong working knowledge of C# programming and the fundamentals of the .NET framework
  • Familiarity with ASP.NET web development (including Razor Pages, MVC, or Minimal APIs)
  • Understanding of core HTTP, routing, and web server concepts
  • No prior security certification is required, but experience in production coding is expected
 14 Hours

Testimonials (5)

Upcoming Courses

Related Categories