Steven Borg, Microsoft Certified Trainer, MCSD.NET
Steve has over 14 years of experience creating technical solutions to a variety of civilian and military problems. He has been the primary .NET Solution presenter for Microsoft Academic at MIT, Harvard, University of Houston and several other noted institutes of higher education throughout the United States. Steve has been requested by different courseware development teams at Microsoft to teach the Beta versions of their new courseware. Steve has taught both Microsoft Official Curriculum (MOC) 2310 Introduction to ASP.NET, and MOC 2609 Introduction to Programming with C# to both students and the instructional designers. His recommendations have resulted in numerous changes to improve both Microsoft official curriculums. Steve has also taught the world-wide T-Prep of both .NET courses.
- Main Menu
Move through hours of in-depth content - quickly and easily due to the efficient and organized structure.
- PowerPoint
Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the user. This type of representation allows the user to better interpret the material through charts, definitions, graphs, and more...
- Exclusive Learning Zone
Train around the clock, around the world. Our certified online instructors are located at global support centers in the U.S., U.K., Australia, and Singapore to provide real-time answers to technology- and soft-skill-related questions 24x7. This means access to a live subject matter expert no matter where you are - day or night. This level of student/instructor interaction provides real-time training specific support and extends training beyond content and instructor-led solutions by providing flexibility to accommodate individual needs and schedules.
- Controls
Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance through exercises.
- Full Motion Video
All courses feature full-motion videos of instructors teaching the information as if they are speaking directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal lesson and learning experience.
- Study Guides
Printable study guides for the entire course are available. This allows all material to be viewed, reviewed, and printed for viewing at a later date.
- Review Exercises
Each section has a review quiz to aid in the learning process by validating the comprehension of the material covered before moving on to a new section.
- Resume
All courses are resumed to where you left off last session allowing you to learn when it is convenient for you without the hassle of remembering where you where.
- Live Demonstrations
Demonstrations are a way for the instructor to show and tell the user how to perform
a task by actually doing it on screen in front of them. In this format it gives the user the power to see things done by a professional in the intended environment as many times as they would like.
- Labs
This course features cutting-edge, interactive labs, which provide a hands-on learning experience. This environment allows you to interact with the software with out the need for purchasing it or having it installed on your computer.
- Certificate of Completion
Our training is recognized worldwide for its technology-based IT training curriculums. Upon successful completion of our program, you will be receiving an official Distance Education Certificate of Completion.
Level 1
Secure.Net Overview
1.1 .Net Assemblies
1.2 Assembly Parts
1.3 Metadata
1.4 Strong Name and Reflection
1.5 Security Overview
1.6 Type Safety Verification
1.7 Code Signing
1.8 Encryption and Digital Signatures
1.9 Code Access and Role Base Security
1.10 Isolated Storage
1.11 Application Deployment
1.12 Versioning
1.13 Configuration
1.14 Review
Metadata and Reflection
2.1 Metadata
2.2 Demo - ILDASM.exe
2.3 Reflection
2.4 Demo - Reflection
2.5 Review
Lab - Using the (MSIL) Disassembly
Secure Coding
3.1 Security Basics
3.2 Security Measures
3.3 Malicious Users & .Net
3.4 Best Practices
3.5 Threat Modeling
3.6 Creating Threat Models
3.7 Applying Threat Models
3.8 Review
Level 2
Cryptography
1.1 Cryptography and Digital Signing
1.2 Symmetric and Asymmetric Scenarios
1.3 Cryptography in the .Net Framework
1.4 Cryptography with Symmetric Algorithms
1.5 Demo - Symmetric Cryptography
1.6 Cryptography with Asymmetric Algorithms
1.7 Demo - Hashing
1.8 Signing Code
1.9 Demo - Strong Names
1.10 Review
Lab - Using the File Signing Tool
Level 3
Code Access Security
1.1 Evidence
1.2 Security Policy
1.3 Code Groups
1.4 Security Policy Level
1.5 Modifying Security Policy
1.6 Demo - Graphical Configuration
1.7 CasPol Tool
1.8 Demo CasPol Tool
1.9 Security Operation Basics
1.10 Permission Demand
1.11 Permission Assert
1.12 Other Security Checks
1.13 Imperative and Declarative Security
1.14 Allow Partially Trusted Callers Attribute
1.15 Imperative Security
1.16 Demo - Imperative Security
1.17 Declarative Security
1.18 Demo - Declarative Security
1.19 Review
Lab - Administrating Security Policy
Level 4
Role Based Security
1.1 Creating Windows Principal and Identity
1.2 Demo - Principal and Identity
1.3 Generic Identity and Principal
1.4 Demo - Generic Authentication
1.5 Principal Permission Object
1.6 Demo - Principal Permission
1.7 Review
Lab - Assign Users to Security Role
Level 5
Isolated Storage
1.1 Defining Isolated Storage
1.2 Using Isolated Storage
1.3 Demo - Isolated Storage
1.4 Review
Creating and Assembly
2.1 Single and Multi File Assemblies
2.2 Demo - Command Line Compilation
2.3 Private VS Shared Assemblies
2.4 Demo - Global Assembly Cache
2.5 Review
Deploying .Net Applications
3.1 Deployment Methods
3.2 Creating a Setup Project
3.3 Demo - Deployment
3.4 Review
Lab - Deploying an Application
Level 6
Assembly Binding Configuration
1.1 Assembly Binding Basics
1.2 Side by Side Deployment
1.3 Configuration Files
1.4 Assembly Binding Process
1.5 Configuration File Syntax
1.6 Creating Policy Configuration Files
1.7 Demo - Assembly Reflection
1.8 Review
Lab - Binding and Configuration
Introduction to Web Security
2.1 Importance of Security
2.2 Security Challenges
2.3 Hackers and Attackers
2.4 Attack Types
2.5 Vulnerabilities
2.6 Implementing Security
2.7 Best Practices
2.8 Review
Level 7
Validating User Input
1.1 Type of User Input
1.2 Why Validate Input
1.3 Type of Validation
1.4 User Input Attacks
1.5 HTTP Cookie and Hear Attacks
1.6 Form Data and Script Attacks
1.7 Demo -Web Form Attacks
1.8 Performing Validation
1.9 Concealing Information
1.10 Review
Lab - The STRIDE Threat Model
Securing Web Pages
2.1 ASP.Net Authentication Methods
2.2 Configuration ASP.Net
2.3 Windows Based Authentication
2.4 Demo -Windows Security
2.5 Form Based Authentication
2.6 Implementing Form Based
Authentication
2.7 Demo - Forms Security
2.8 Review
Level 8
Server Security
1.1 Internet Information Services IIS
1.2 Impersonation and User ID
1.3 Configuring Permissions
1.4 Client Authentication
1.5 Application Protection Level
1.6 Demo - IIS
1.7 Windows Server 2000/2003
1.8 Access Control Lists
1.9 Windows Server Best Practices
1.10 Demo - Creating ACLs
1.11 SQL Server
1.12 Authentication and Permissions
1.13 SQL Server Best Practices
1.14 Demo - SQL Server
1.15 SQL to IIS Security
1.16 SQL Injection Attacks
1.17 Demo - Injection Attacks
1.18 Injection Attack Protection
1.19 Review
Lab - Internet Information Services
Level 9
Protecting Communication
1.1 Digital certificates
1.2 SSL/TLS
1.3 IPSec
1.4 Review
Web Applications
2.1 Web Security Difference
2.2 Creating a Test Plan
2.3 Performing a Security Test
2.4 Review
Lab - The Dread Threat Model
Best Practices
3.1 Web Service Enhancements WSE
3.2 Cryptography
3.3 Web Application Security
3.4 User Input
3.5 General Good Practices
3.6 Critical Best Practices
3.7 Review