Security testing C and C++ applications (SECT-CCA) – Contenuti
Contenuti dettagliati del Corso
Day 1
- Cyber security basics
- What is security?
- Threat and risk
- Cyber security threat types – the CIA triad
- Cyber security threat types – the STRIDE model
- Consequences of insecure software
- Memory management vulnerabilities
- Assembly basics and calling conventions
- Buffer overflow
- Best practices and some typical mistakes
Day 2
- Memory management hardening
- Runtime protections
- Security testing
- Security testing methodology
- Common software security weaknesses
- Security features
- Authentication
- Password management
Day 3
- Common software security weaknesses
- Input validation
- Input validation principles
- What to validate – the attack surface
- Where to validate – defense in depth
- When to validate – validation vs transformations
- Validation with regex
- Injection
- Integer handling problems
- Files and streams
- Security testing
- Security testing techniques and tools
- Code analysis
- Dynamic analysis
- Wrap up
- Secure coding principles
- And now what?