SlideShare a Scribd company logo
SOFTWARE
SECURITY TRAINING
Price: $1,699.00 Length: 2 Days
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Software Security Training course acquaints you with an assortment
of points in software security, for example, secure programming
systems, confided in processing foundation, low level software
assaults, wen security, chance administration strategies,
representative execution, and cloud/remote/cell phone security.
By the approach of registering frameworks which are a fundamental
piece of our every day lives, one ought to have the capacity to
depend on the uprightness of the framework and the data ought to
be kept private.
By taking TONEX software security training, you will take in the
essential standards of PC security, vulnerabilities, PC wrongdoings,
dangers, and idea of web security. Additionally, you will be
acquainted with the protected programming methods as a piece of
software security, code inspecting, SQL infusion, and secure coding
standards.
This workshop will show you extraordinary arrangement of data
about confided in registering foundation (TCI), process hubs,
confided in stage module (TPM), software trustworthiness,
information honesty and ensuring accreditations incorporated into
stage security.
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
TONEX software security training will likewise enable you to find out
about the software security assaults, for example, cushion flood,
information just assaults or non-executable information assaults.
Besides, comprehend the significance of web security issues,
malignant sites, and dissent of administration assaults.
You additionally will find out about the primary standards for secure
plan, open outline, and hazard administration strategies in software
plan. Figure out how to separate the receptive and proactive hazard
administration methods, decipher the factual control diagrams in
measurable examination, and representative execution in software
security. Students additionally will complete this workshop with
adequate information about the entrance testing and its
apparatuses, cloud security applications and modules, and strategies
for information security and protection.
This training encourages you to find the issues of remote system
security, for example, LAN assaults, Wi-Fi insurance plans, WPA, and
WPA2 idea and how to resistance against the assaults.
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
TONEX software security training incorporates numerous in-class
exercises including hands on works out, contextual investigations
and workshops. Amid the software security training, understudies
get their own particular example work and extends and through our
instructing, build up their own particular security framework.
At last, the software security basics training will present the portable
framework security ideas, for example, versatile program security,
confirmation of cell phones, cell phone administration, malware
identification strategies in versatile administration and
dynamic/static cell phone examination.
Trusted
computing
infrastructure
(TCI)
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Audience:
The software security training is a 2-day course designed for:
• All individuals who need to understand the concept of software
security.
• IT professionals in the areas of software security
• Cyber security professionals, network engineers, security
analysts, policy analysts
• Security operation personnel, network administrators, system
integrators and security consultants
• Security traders to understand the software security of web
system, mobile devices, or other devices.
• Investors and contractors who plan to make investments in
security system industry.
• Technicians, operators, and maintenance personnel who are or
will be working on cyber security projects
• Managers, accountants, and executives of cyber security
industry.
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Training Outline:
The software security training course consists of the following
lessons, which can be revised and tailored to the client’s need:
• Computer Security Principles
• Secure Programming Techniques
• Trusted Computing Infrastructure (TCI)
• Low Level Software Security Attacks and Protection
• Web Security
• Secure Design Principles
• Risk Management
• Statistical Analysis
• Symbolic Execution
• Penetration Testing
• Cloud Security
• Data Security and Privacy (DAP)
• Wireless Network Security
• Mobile System Security (MSS)
• Hands-on and In-Class Activities
• Sample Workshops Labs for Software Security Training
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Computer Security Principles:
• Introduction to computer security
• Computer crime
• Accuracy, Integrity, and Authenticity
• Vulnerabilities
• Introduction to Crypto
• Access control
• Threats to security
• System correctness
• Application of operating system security
• Web security
• Network security
• Operating system security
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Secure Programming Techniques:
• General principles of secure programming
• Reasons of insecurity
• Economic reasons
• Security measurements
• Marketing problems
• Security requirements
• Confidentiality
• Integrity Availability
• Code auditing
• C/C++ codes
• Assurance measure requirements
• Open source software and security
• Disclosure of vulnerabilities
• Vulnerability classes
• Web security
• SQL injection
• PHP
• Shell Scripts
• Java
• Secure programming for Linux and Unix
• Secure coding, principles and practices
• Statistical analysis for secure programming
C/C++ codes
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Trusted Computing Infrastructure (TCI):
• Definition of trusted computing
• Processing nodes
• Protecting processing nodes against threats
• Node controllers
• Trust relationship in networked society
• Trusted computing cloud model
• Trusted Platform Module (TPM)
• Trusted computing Attestation process
• Implementation aspects
• Main TPM duties
• Unique platform identity
• Software integrity
• Network integrity
• Data integrity
• Protecting credentials
• Device identity
• Secure execution
• Crypto erase
• Examples of Platform security
Trusted
computing
infrastructure
(TCI)
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Low Level Software Security Attacks and Protection:
• Introduction to software security attacks
• Stack-based buffer overflow
• Heap-based buffer overflow
• Return-to-l ibc attacks
• Data-only attacks
• Methods of defense against security attacks
• Stack canaries
• Non-executable data
• Control- flow integrity
• Layout randomization
• Other defense methods
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Secure Design Principles:
• Least Privileges
• Fail-Safe Defaults
• Economy of Mechanism
• Complete Mediation
• Open Design
• Separation of Privilege
• Diebold voting machines example
• Least Common Mechanism
• Psychological Acceptability
• Fail-safe defaults
• Principles of software security
• Defense practice
• Compartmentalize
• Promoting the privacy
• Using community resources
• Securing easy targets
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Risk Management:
• Security risk management concepts
• Definition of risk management
• Threat response time
• Regulatory compliance
• Infrastructure management cost
• Risk prioritization
• Reactive and proactive risk management
• Identifying risk management prerequisites
• Communicating risks
• Assessing risks
• Classifying assets
• Organizing risk information
• Threat probability estimation
• Quantifying risks
• Conducting decision support
• Control solution
• Implementing controls
• Measuring program effectiveness
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Statistical Analysis:
• User interface
• Statistical roles and challenges in network security
• Network traffic and data
• Network data characteristics
• Exploring network data
• Descriptive analysis
• Visualizing analysis
• Data reduction
• Network data modeling for association and prediction
• Bivariate analysis
• Measuring user behavior
• Supervised learning
• Decision analysis in network security
• Uncertainty analysis
• Statistical control chart
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Symbolic Execution:
• Base Imperative Language
• Input domain
• Expressions and types
• Basic definitions
• Traces, paths, and programs
• Basics of symbolic execution
• Classic symbolic execution
• Generalized symbolic execution
• Application of symbolic execution
• Trace based symbolic execution
• Multi-path symbolic execution
• Macroscopic view of symbolic execution
• Cost of symbolic execution
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Penetration Testing:
• Definition
• Port scanning
• Vulnerability scanning
• Penetration testing
• Why penetration testing?
• Steps toward application of penetration testing
• Penetration testing tools
• Kali Linux
• Maltego
• WHOIS service
• Vega
• Hydra
•
Cloud Security:
• Definition of cloud
• Definition of security
• Cloud computing definition
• Features, attributes, characteristic of cloud computing
• Cloud based applications
• Cloud based developments
• Cloud based infrastructure
• Cloud models (SAAS,PAAS,IAAS)
• Problems associated with cloud computing
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Data Security and Privacy (DAP):
• Definition of Data
• Data security
• Prevention and detection of Data security issues
• Reaction against data security
• Audit standards
• Data security policies
• Data security tools
• Monitoring secured data
• Documenting the data security
• Data privacy enforcement
Wireless Network Security:
• Wireless networks and security definition
• What is LAN?
• Simple Wireless LAN
• Attacks and Defense against attacks in wireless network
• Wired Equivalent Privacy (WEP)
• Wi-Fi Protected Access (WPA)
• Wi-Fi Protected Access-Version 2 (WPA2)
• Attacks to WEP
• Defense for WEP attacks
• Common attack types for WPA and WPA2
• Wireless encryption
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Mobile System Security (MSS):
• Mobiles are everywhere
• Uniqueness of Mobiles
• Management and security challenges for Mobile systems
• Mobile security faced by Enterprises
• Visualizing Mobile Security
• Hardware security
• Mobile Web browsers
• Authenticating users to devices
• Application security
• Mobile Security solution
• Permission and encryption
• Security philosophy
• Mobile Device Management (MDM)
• Mobile Operating Systems
• Malware Detection in Mobile System
• Cloud based detection
• Dynamic/Static analysis
Software Security Training
https://www.tonex.com/training-courses/software-security-training/
Hands-on and In-Class Activities
• Labs
• Workshops
• Group Activities
Sample Workshops Labs for Software Security Training
• Application of Linux command lines
• User-mode Linux and the mln tool
• Introduction to vulnerable software
• Manual and automatic code review
• Preventing from exploitation
• Symbolic execution workshop
• SQL injection workshop
• Command execution example
VISIT TONEX EVENTS
SOFTWARE
SECURITY TRAINING
VISIT TONEX.COM
Price: $1,699.00 Length: 2 Days
VISIT TONEX.COM
https://www.tonex.com/

More Related Content

PPTX
Cyber security applied to embedded systems
PPTX
Software application security training course | Tonex Training
PPT
Introduction to information security
PDF
Offensive cyber security engineer updated
PDF
Comptia security-sy0-601-exam-objectives-(2-0)
PDF
CISSP Certification Training Course
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PPTX
Project cyper
Cyber security applied to embedded systems
Software application security training course | Tonex Training
Introduction to information security
Offensive cyber security engineer updated
Comptia security-sy0-601-exam-objectives-(2-0)
CISSP Certification Training Course
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Project cyper

What's hot (20)

PPTX
Get training in cyber security & place yourself in good companies through...
PDF
1 info sec+risk-mgmt
PDF
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
PPT
CompTIA Security+ Module1: Security fundamentals
PPTX
Fundamentals of threats and risk management course, cybersecurity
PDF
Get training in cyber security & place yourself in good companies through...
PPTX
Mobile Device Security Training
PPTX
Cyber Security Certificate Training
PDF
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
PPTX
Ics & computer security for nuclear facilities
PDF
CompTIA Security+ SY0-601 Domain 2
PDF
Comptia security sy0 601 domain 4 operation and incident response
PDF
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
PPTX
IT Security and Management - Prelim Lessons by Mark John Lado
PPTX
Red Team vs. Blue Team
PDF
Internet safety and security strategies for building an internet safety wall
PDF
Cyber_Services_2015_company_intro_ENG_v2p0
PPTX
List of cybersecurity training courses by Tonex
PDF
Information security
Get training in cyber security & place yourself in good companies through...
1 info sec+risk-mgmt
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
CompTIA Security+ Module1: Security fundamentals
Fundamentals of threats and risk management course, cybersecurity
Get training in cyber security & place yourself in good companies through...
Mobile Device Security Training
Cyber Security Certificate Training
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Ics & computer security for nuclear facilities
CompTIA Security+ SY0-601 Domain 2
Comptia security sy0 601 domain 4 operation and incident response
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
IT Security and Management - Prelim Lessons by Mark John Lado
Red Team vs. Blue Team
Internet safety and security strategies for building an internet safety wall
Cyber_Services_2015_company_intro_ENG_v2p0
List of cybersecurity training courses by Tonex
Information security
Ad

Similar to Software Security Training (20)

PPTX
Web Security Training : Tonex Training
PPTX
Starting your Career in Information Security
PDF
Chapter 1 introduction(web security)
PPTX
All About Network Security & its Essentials.pptx
PPTX
Web Security Training
PDF
Careers in Cyber Security
PDF
Secure Software Development: Best practice and strategies.pdf
PDF
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
PDF
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
PDF
Security+ SY0-701 CERTIFICATION TRAINING.pdf
PDF
CompTIA Security+ (Plus) Certification Training Course
PDF
CompTIA_Security_plus_SY0-701_course_content.pdf
PDF
CompTIA_Security_plus_SY0-701_course_content.pdf
PPTX
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
PPTX
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
PDF
Lucideus Certified Cyber Security Analyst
PPTX
Cyber Threat Simulation
PPTX
CS5300 class presentation on managing information systems
PDF
Week 09_Cyber security u.pdf
PPTX
Cybersecurity; Definition, Use, and Practice
Web Security Training : Tonex Training
Starting your Career in Information Security
Chapter 1 introduction(web security)
All About Network Security & its Essentials.pptx
Web Security Training
Careers in Cyber Security
Secure Software Development: Best practice and strategies.pdf
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
Security+ SY0-701 CERTIFICATION TRAINING.pdf
CompTIA Security+ (Plus) Certification Training Course
CompTIA_Security_plus_SY0-701_course_content.pdf
CompTIA_Security_plus_SY0-701_course_content.pdf
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Lucideus Certified Cyber Security Analyst
Cyber Threat Simulation
CS5300 class presentation on managing information systems
Week 09_Cyber security u.pdf
Cybersecurity; Definition, Use, and Practice
Ad

More from Bryan Len (20)

PPTX
Mastering Root Cause Analysis: Empower Your Team with Tonex's Comprehensive T...
PPTX
Embedded Systems Training Programs
PPTX
OSINT (Open Source Intelligence) Training by Tonex
PPTX
Digital Twins Training for Solar Plant
PPTX
Leadership Training For Women - Shaping Leadership Skills in 2023
PPTX
MBSE SYSML Courses By Tonex
PPTX
Common Industrial Protocol (CIP) Training
PPTX
SysML MBSE Training Courses, Seminars & Consulting Services by Tonex
PPTX
Automotive Engineering Courses 2023
PPTX
IPv6 Systems Engineering Training Course
PDF
IPV6-Desktop-Support - Tonex Training
PPTX
IPV6 (Internet Protocol version 6), IPv6 Certification Training Programs by T...
PPTX
5G and IOT Systems Engineering Training Courses, Seminars and Consulting Serv...
PPTX
MBSE Online Courses (Top 5), Learn how MBSE Ensures Cost-Effective Engineeri...
PPTX
Automotive Cybersecurity Training Course, Seminars and Consulting Services by...
PPTX
Reliability Engineering Training Course, Seminars and Consulting Services by ...
PPTX
Microgrids Certification Training, The Solution for Powering The Future
PPTX
Biofuels Training, Understand BioFuels Types and Industry, Tonex Training Course
PPTX
Clean Energy Workshop, Learn how to Net-Zero Emissions
PPTX
The “Cyber Kill Chain”, Cybersecurity Mini MBA Program Online
Mastering Root Cause Analysis: Empower Your Team with Tonex's Comprehensive T...
Embedded Systems Training Programs
OSINT (Open Source Intelligence) Training by Tonex
Digital Twins Training for Solar Plant
Leadership Training For Women - Shaping Leadership Skills in 2023
MBSE SYSML Courses By Tonex
Common Industrial Protocol (CIP) Training
SysML MBSE Training Courses, Seminars & Consulting Services by Tonex
Automotive Engineering Courses 2023
IPv6 Systems Engineering Training Course
IPV6-Desktop-Support - Tonex Training
IPV6 (Internet Protocol version 6), IPv6 Certification Training Programs by T...
5G and IOT Systems Engineering Training Courses, Seminars and Consulting Serv...
MBSE Online Courses (Top 5), Learn how MBSE Ensures Cost-Effective Engineeri...
Automotive Cybersecurity Training Course, Seminars and Consulting Services by...
Reliability Engineering Training Course, Seminars and Consulting Services by ...
Microgrids Certification Training, The Solution for Powering The Future
Biofuels Training, Understand BioFuels Types and Industry, Tonex Training Course
Clean Energy Workshop, Learn how to Net-Zero Emissions
The “Cyber Kill Chain”, Cybersecurity Mini MBA Program Online

Recently uploaded (20)

PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Nekopoi APK 2025 free lastest update
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Transform Your Business with a Software ERP System
PDF
System and Network Administraation Chapter 3
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Introduction to Artificial Intelligence
PPTX
history of c programming in notes for students .pptx
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
Reimagine Home Health with the Power of Agentic AI​
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Wondershare Filmora 15 Crack With Activation Key [2025
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Navsoft: AI-Powered Business Solutions & Custom Software Development
Nekopoi APK 2025 free lastest update
PTS Company Brochure 2025 (1).pdf.......
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Design an Analysis of Algorithms I-SECS-1021-03
Odoo Companies in India – Driving Business Transformation.pdf
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Transform Your Business with a Software ERP System
System and Network Administraation Chapter 3
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Introduction to Artificial Intelligence
history of c programming in notes for students .pptx
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Upgrade and Innovation Strategies for SAP ERP Customers

Software Security Training

  • 2. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Software Security Training course acquaints you with an assortment of points in software security, for example, secure programming systems, confided in processing foundation, low level software assaults, wen security, chance administration strategies, representative execution, and cloud/remote/cell phone security. By the approach of registering frameworks which are a fundamental piece of our every day lives, one ought to have the capacity to depend on the uprightness of the framework and the data ought to be kept private. By taking TONEX software security training, you will take in the essential standards of PC security, vulnerabilities, PC wrongdoings, dangers, and idea of web security. Additionally, you will be acquainted with the protected programming methods as a piece of software security, code inspecting, SQL infusion, and secure coding standards. This workshop will show you extraordinary arrangement of data about confided in registering foundation (TCI), process hubs, confided in stage module (TPM), software trustworthiness, information honesty and ensuring accreditations incorporated into stage security.
  • 3. Software Security Training https://www.tonex.com/training-courses/software-security-training/ TONEX software security training will likewise enable you to find out about the software security assaults, for example, cushion flood, information just assaults or non-executable information assaults. Besides, comprehend the significance of web security issues, malignant sites, and dissent of administration assaults. You additionally will find out about the primary standards for secure plan, open outline, and hazard administration strategies in software plan. Figure out how to separate the receptive and proactive hazard administration methods, decipher the factual control diagrams in measurable examination, and representative execution in software security. Students additionally will complete this workshop with adequate information about the entrance testing and its apparatuses, cloud security applications and modules, and strategies for information security and protection. This training encourages you to find the issues of remote system security, for example, LAN assaults, Wi-Fi insurance plans, WPA, and WPA2 idea and how to resistance against the assaults.
  • 4. Software Security Training https://www.tonex.com/training-courses/software-security-training/ TONEX software security training incorporates numerous in-class exercises including hands on works out, contextual investigations and workshops. Amid the software security training, understudies get their own particular example work and extends and through our instructing, build up their own particular security framework. At last, the software security basics training will present the portable framework security ideas, for example, versatile program security, confirmation of cell phones, cell phone administration, malware identification strategies in versatile administration and dynamic/static cell phone examination. Trusted computing infrastructure (TCI)
  • 5. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Audience: The software security training is a 2-day course designed for: • All individuals who need to understand the concept of software security. • IT professionals in the areas of software security • Cyber security professionals, network engineers, security analysts, policy analysts • Security operation personnel, network administrators, system integrators and security consultants • Security traders to understand the software security of web system, mobile devices, or other devices. • Investors and contractors who plan to make investments in security system industry. • Technicians, operators, and maintenance personnel who are or will be working on cyber security projects • Managers, accountants, and executives of cyber security industry.
  • 6. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Training Outline: The software security training course consists of the following lessons, which can be revised and tailored to the client’s need: • Computer Security Principles • Secure Programming Techniques • Trusted Computing Infrastructure (TCI) • Low Level Software Security Attacks and Protection • Web Security • Secure Design Principles • Risk Management • Statistical Analysis • Symbolic Execution • Penetration Testing • Cloud Security • Data Security and Privacy (DAP) • Wireless Network Security • Mobile System Security (MSS) • Hands-on and In-Class Activities • Sample Workshops Labs for Software Security Training
  • 7. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Computer Security Principles: • Introduction to computer security • Computer crime • Accuracy, Integrity, and Authenticity • Vulnerabilities • Introduction to Crypto • Access control • Threats to security • System correctness • Application of operating system security • Web security • Network security • Operating system security
  • 8. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Secure Programming Techniques: • General principles of secure programming • Reasons of insecurity • Economic reasons • Security measurements • Marketing problems • Security requirements • Confidentiality • Integrity Availability • Code auditing • C/C++ codes • Assurance measure requirements • Open source software and security • Disclosure of vulnerabilities • Vulnerability classes • Web security • SQL injection • PHP • Shell Scripts • Java • Secure programming for Linux and Unix • Secure coding, principles and practices • Statistical analysis for secure programming C/C++ codes
  • 9. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Trusted Computing Infrastructure (TCI): • Definition of trusted computing • Processing nodes • Protecting processing nodes against threats • Node controllers • Trust relationship in networked society • Trusted computing cloud model • Trusted Platform Module (TPM) • Trusted computing Attestation process • Implementation aspects • Main TPM duties • Unique platform identity • Software integrity • Network integrity • Data integrity • Protecting credentials • Device identity • Secure execution • Crypto erase • Examples of Platform security Trusted computing infrastructure (TCI)
  • 10. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Low Level Software Security Attacks and Protection: • Introduction to software security attacks • Stack-based buffer overflow • Heap-based buffer overflow • Return-to-l ibc attacks • Data-only attacks • Methods of defense against security attacks • Stack canaries • Non-executable data • Control- flow integrity • Layout randomization • Other defense methods
  • 11. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Secure Design Principles: • Least Privileges • Fail-Safe Defaults • Economy of Mechanism • Complete Mediation • Open Design • Separation of Privilege • Diebold voting machines example • Least Common Mechanism • Psychological Acceptability • Fail-safe defaults • Principles of software security • Defense practice • Compartmentalize • Promoting the privacy • Using community resources • Securing easy targets
  • 12. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Risk Management: • Security risk management concepts • Definition of risk management • Threat response time • Regulatory compliance • Infrastructure management cost • Risk prioritization • Reactive and proactive risk management • Identifying risk management prerequisites • Communicating risks • Assessing risks • Classifying assets • Organizing risk information • Threat probability estimation • Quantifying risks • Conducting decision support • Control solution • Implementing controls • Measuring program effectiveness
  • 13. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Statistical Analysis: • User interface • Statistical roles and challenges in network security • Network traffic and data • Network data characteristics • Exploring network data • Descriptive analysis • Visualizing analysis • Data reduction • Network data modeling for association and prediction • Bivariate analysis • Measuring user behavior • Supervised learning • Decision analysis in network security • Uncertainty analysis • Statistical control chart
  • 14. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Symbolic Execution: • Base Imperative Language • Input domain • Expressions and types • Basic definitions • Traces, paths, and programs • Basics of symbolic execution • Classic symbolic execution • Generalized symbolic execution • Application of symbolic execution • Trace based symbolic execution • Multi-path symbolic execution • Macroscopic view of symbolic execution • Cost of symbolic execution
  • 15. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Penetration Testing: • Definition • Port scanning • Vulnerability scanning • Penetration testing • Why penetration testing? • Steps toward application of penetration testing • Penetration testing tools • Kali Linux • Maltego • WHOIS service • Vega • Hydra • Cloud Security: • Definition of cloud • Definition of security • Cloud computing definition • Features, attributes, characteristic of cloud computing • Cloud based applications • Cloud based developments • Cloud based infrastructure • Cloud models (SAAS,PAAS,IAAS) • Problems associated with cloud computing
  • 16. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Data Security and Privacy (DAP): • Definition of Data • Data security • Prevention and detection of Data security issues • Reaction against data security • Audit standards • Data security policies • Data security tools • Monitoring secured data • Documenting the data security • Data privacy enforcement Wireless Network Security: • Wireless networks and security definition • What is LAN? • Simple Wireless LAN • Attacks and Defense against attacks in wireless network • Wired Equivalent Privacy (WEP) • Wi-Fi Protected Access (WPA) • Wi-Fi Protected Access-Version 2 (WPA2) • Attacks to WEP • Defense for WEP attacks • Common attack types for WPA and WPA2 • Wireless encryption
  • 17. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Mobile System Security (MSS): • Mobiles are everywhere • Uniqueness of Mobiles • Management and security challenges for Mobile systems • Mobile security faced by Enterprises • Visualizing Mobile Security • Hardware security • Mobile Web browsers • Authenticating users to devices • Application security • Mobile Security solution • Permission and encryption • Security philosophy • Mobile Device Management (MDM) • Mobile Operating Systems • Malware Detection in Mobile System • Cloud based detection • Dynamic/Static analysis
  • 18. Software Security Training https://www.tonex.com/training-courses/software-security-training/ Hands-on and In-Class Activities • Labs • Workshops • Group Activities Sample Workshops Labs for Software Security Training • Application of Linux command lines • User-mode Linux and the mln tool • Introduction to vulnerable software • Manual and automatic code review • Preventing from exploitation • Symbolic execution workshop • SQL injection workshop • Command execution example VISIT TONEX EVENTS
  • 19. SOFTWARE SECURITY TRAINING VISIT TONEX.COM Price: $1,699.00 Length: 2 Days VISIT TONEX.COM