Download ECSP – EC-Council Certified Secure Programmer

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cryptography wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Cross-site scripting wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Computer security wikipedia , lookup

Unix security wikipedia , lookup

Mobile security wikipedia , lookup

Authentication wikipedia , lookup

Secure multi-party computation wikipedia , lookup

Security-focused operating system wikipedia , lookup

3-D Secure wikipedia , lookup

Transcript
ECSP – EC-Council Certified Secure Programmer
5 Days
$?
The bugs, defects and flaws that exist in software applications and programs
present common vulnerabilities for malicious hackers to exploit. This EC-Council
course teaches professional programmers who utilize Java and .NET frameworks to
design and develop applications while adhering to secure coding practices to limit the possibility of security
vulnerabilities.
The course prepares candidates for the ECSP-Java (312-93) and ECSP.NET (312-94) exams.
Recommend Experience:
Who Should Enroll?
Candidates should have:
ECSP candidates include:

Exam Objectives:
.NET (312-94)










Skills and experience with C++, C#, PHP, Java,
ASP, .NET, and SQL programming.
.NET and Java Professional
Programmers
Java (312-93)







.NET Application Security
.NET Framework Security
Input Validation and Output Encoding
.NET Authorization and Authentication
Secure Session and State Management
.NET Cryptography

.NET Error Handling, Logging and Auditing
Secure File Handling in .NET

Configuration Management and Secure
Code Review


Java Security Intro
Software Development Security
File Input and Output
Serialization
Input Validation
Error Handling and Logging
Authorization and
Authentication
JAAS - Java Authentication and
Authorization Service
Java Concurrency and
Managing Sessions
Cryptography and Java
Vulnerabilities in Java
Applications
Training Options
By training with us you will receive additional study materials and practice exams in addition to your
courseware to best prepare you for achieving this certification. We also strive to provide a comfortable
learning environment by providing breakfast, fresh baked cookies and unlimited coffee, sodas and tea.
Learn more about the Phoenix TS training difference and our upcoming EC-Council® class dates by
contacting a training consultant at 240-667-7757 or at [email protected].