Oops! It appears that you have disabled your Javascript. In order for you to see this page as it is meant to appear, we ask that you please re-enable your Javascript!
page preloader

EC-Council Certified Secure Programmer

ecsp_banner


ecsp-center-text

Introduction

EC-Council Certified Secure Programmer lays the foundation required by all application developers and development organizations to produce applications with greater stability and fewer security risks to the consumer. The Certified Secure Application Developer standardizes the knowledge base for application development by incorporating the best practices followed by experienced experts in the various domains.

Course Objective

  • Familiarize you with .Net Application Security, ASP.Net Security Architecture, Java security principles and help you understand the need for application security and common security threats to .Net framework
  • Discuss security attacks on .Net framework, Java,ava Security Platform, Sandbox, JVM, Class loading, Bytecode verifier, Security Manager, security policies, Java Security Framework and explain the secure software development life cycle
  • Help you to understand common threats to .Net assemblies, Java framework and familiarize you with stack walking processes
  • Discuss the need for input validation, various input validation approaches, common input validation attacks, validation control vulnerabilities, and best practices for input validation
  • Explain symmetric and asymmetric encryption, hashing concepts, digital certificates, digital and XML signatures
  • Examine file handling concepts, file handling security concerns, path traversal attacks on file handling, and defensive techniques against path traversal attack
  • Understand information security controls, laws and standards

Prerequisites

  • Candidate should have complete knowledge of Java & .Net
  • Good Understanding of OOPS.
  • It is recommended that candidate should have knowledge of Socket Programming.

Downloads

ECSP JAVA Brochure:

Download

ECSP .NET Brochure:

Download

Syllabus

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Web servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls and Honeypots
  • Cloud Computing
  • Cryptography

Related Courses

  • CEH (Certified Ethical Hacker)

    The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
    Read More
  • RHCE (RedHat Certified Engineer)

    A Red Hat® Certified Engineer (RHCE) is a Red Hat Certified System Administrator (RHCSA) who possesses the additional skills, knowledge, and abilities required of a senior system administrator responsible for Red Hat Enterprise Linux systems.
    Read More
  • LSCLU (Linux Solution Certified Linux User)

    Linux Essentials of Linux OS is for people new to Linux and who want to achieve maximum productivity at home or at workplace using Linux Command-line Utilities and Desktop-based office application suites for common office productivity tasks. The course covers the methods of using Linux Shell and the desktop GUI interface (KDE & GNOME) and office productivity applications for traditional desktop tasks such as word processing, spreadsheet creation, internet access and demonstrates the ability to comfortably share work across platforms. The course is offered on the latest version of Linux OS.
    Read More

Enquire Now