Implementing Security for Applications with Microsoft Visual C# .NET Training


Implementing Security for Applications with Microsoft Visual C# .NET Training

This course will give you the ability to implement code using methods to minimize security risks and take advantage of the security functionality built into the .NET Framework When you pass the Implementing Security for Applications with Microsoft Visual C# .NET exam, you achieve Microsoft Certified Professional status.

  Candidates have experience developing both Web-based and Microsoft Windows®-based applications from start to finish

Did you know that being certified would increase your salary tremendously? Microsoft certification is a leading credential that validates your experience and skills to keep you competitive in today's changing business environment. Technical and Professional certification is becoming more popular today. Because of the rise of the Internet, and the overall growth of the Information Technology, companies are finding it hard to find the right person to fill IT positions, being certified is even more important today!

n Our easy-to-use delivery format allows you to concentrate on the lesson at hand and not how to run the delivery software - saving you time and frustration. Our comprehensive course materials are delivered in an easy-to- understand format - allowing you to get the most out of your time. n

Our courses incorporate audio, video, and text training and then the total experience is reinforced with exercises and practice tests to ensure that you have really grasped the material.

This Course is available online or via DVD's:
Online Course = All items marked with are included.
DVD Study Kit = Everything! - If its marked with then its included.
For Pricing - Click Here
Live Video,
Courses =
Courses =
Online Streaming Video
(Broadband min 512k)
12 Months subscription
Featuring live instructor-led classroom-like sessions in digital video format. Multimedia-rich delivery brings experienced subject matter experts to your desktop or laptop.
Training Simulations  
DVD Courses = Delivered on DVD
Online Courses = Online Access
Interactive hands-on practice lab
Email Support  
1 Year's Technical Email Support
DVD Courses= Delivered
on DVD
Online Courses = Downloadable
Free Upgrades  
12 months of Free Upgrades.
Compatibility with:  

XP | Win 2003/8 server | Vista
Exam Simulator  
Exam Simulator for closest replication to the real exam!



Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player





Implementing Security for Applications with Microsoft Visual C# .NET - Learning Segments

Applications by Using Security Best Practices
Develop code under a least privilege account within the development environment.
  • Configure the Microsoft .NET development environment and operating system.
  • Select the appropriate privileges.
Develop code that runs under a least privilege account at run time.
  • Develop code to run under a least privilege account that does not have administrator privileges.
  • Use least privilege for access to resources such as the file system, registry entries, and databases.
Analyze security implications of calling unknown code. Third-party components include .NET components, legacy COM components, ActiveX controls, Win32 DLLs, and Web services.
  • Write code to verify that the identity of a COM component matches the identity expected.
  • Validate that data to and from third-party components conforms to the expected size, format, and type.
  • Test for integrity of data after transmission.
  • Evaluate unmanaged code.
Write code that addresses failures in a manner that does not compromise security.
  • Write code that defaults to a permission set that is more secure than the permission set that existed before the errors or issues occurred.
  • Create error messages that do not compromise security.
Develop code that includes security measures in each tier of the solution, also known as defense in depth.
Implement application functionality to apply defaults that minimize security threats.
Write code to prevent canonicalization problems.
  • Create canonical references for resources.
  • Validate that a reference is canonical.
Validate external input at every boundary level to prevent security problems.
  • Write code to test strings by using regular expressions.
  • Write code to test the size of data.
  • Write code to prevent SQL injection and cross-site scripting.
Developing .NET Applications That Include Security Enhancements
Implement security by using application domains.
Implement authentication.
  • Implement a custom authentication mechanism in a Windows Forms application.
  • Implement an appropriate Web application or Web service authentication mechanism to accommodate specific application security requirements.
  • Implement functionality by consuming authenticated user information such as the IPrincipal, Membership, and Identity components of the .NET base class library.
Write authorization code.
  • Programmatically control access to functionality and data by using user information such as user identity, group membership, and other custom user information.
  • Control access to Web applications by using URL authorization.
  • Programmatically control access to functionality and data by using identities or criteria that are independent of user identity.
Sign data by using certificates.
Implement data protection.
  • Use .NET cryptographic techniques.
    • Encrypt and decrypt data by using symmetric and asymmetric cryptographic functions.
    • Compute hashes by using cryptographic functions.
    • Write code to create cryptographically random numbers for cryptographic functions.
  • Protect data in files and folders by creating, modifying, and deleting discretionary access control list (DACL) or security access control list (SACL) entries.
  • Encrypt and decrypt data by using the Data Protection API (DPAPI).
Implement security for an application or shared library by using .NET code access security.
  • Demand a code access permission such as FileIOPermission.
  • Group code access permissions into a permission set.
  • Override code access security checks.
  • Protect a resource in a library.
  • Specify the permission requests of an application.
  • Customize code access security.
Access remote functionality in a manner that minimizes security risks.
  • Use Web Services Enhancements for Microsoft .NET (WSE), such as WS-Security and WS-Interoperability.
  • Configure .NET remoting for security.
Configuring Application Security by Using the Microsoft .NET Framework and Operating System Tools
Work with .NET Security policies. Tools include the .NET Framework Configuration tool and the Code Access Security Policy tool.
Analyze the code access permissions of an assembly by using the Permissions View tool.
Configure security by using IIS and ASP.NET.
  • Understand the security implications of impersonation.
  • Configure ASP.NET impersonation.
  • Configure Web folder permissions.
  • Set appropriate permissions on Web application files.
  • Configure a Web page or Web service to use SSL/TLS.
Stabilizing and Releasing Applications in a Manner That Minimizes Security Risks
Perform unit testing on applications and components to identify security vulnerabilities.
Release applications in a manner that minimizes security risks.
  • Evaluate when to sign an assembly.
  • Implement delayed signing.
  • Create a strong named assembly.
  • Configure security settings by using the .NET Framework Configuration tool and the Code Access Security Policy tool at deployment.


Full motion video

Each class is presented in full motion video allowing you to see the steps, hear the explanations, and perform the tasks which includes our interactive hands-on training simulations, students will learn from real-world scenarios taught by our expert instructor.

Instructor-Led Training

Combines both the convenience and affordability of computer-based training with the effectiveness of a traditional classroom setting. The instructors featured in our multi-media DVD's are not only certified in their area of expertise, but also have years of real world experience and are subject matter experts in their fields.


We supply a complete line of e-books to offer a complete training solution. Our courses include e-books for CompTIA, CISCO and Microsoft certifications.Supplied on DVD for DVD courses or downloadable for Online Courses.

Practice Exam Simulators

We offer exam simulators for all technical certifications. Our exam simulators are the closest replication to the real exam!

Our exam simulators creates a simulation of an actual certification exam. Under timed conditions, IntelliSage? sets up a test with 60 randomly chosen questions designed to help you get ready for the real exam. As with the Practice Exam, the Certification Simulator allows you to mark questions you cannot answer for review at the end of the test.
If you ask, IntelliSage? will show you the correct answer. IntelliSage? will also explain why it is the correct answer when you select the "Learn Now" feature. The Practice Exam is the first IntelliSage? step in getting you ready to pass your certification exams.

Hands-on Lab Simulation

Hands-on Lab Simulation is a crucial component of your IT training. Practice make perfect. Step-by-step hands-on labs with detail instructions are included to reinforce all key concepts. When you complete a topic, choose the Lab Simulation button to select the associated hands-on lab exercises. Labs allow you to reinforce concepts by performing the tasks you've just learned..

Free Upgrades

A unique benefit of the our Learning System, is that
it allows you to stay current with the ever-changing certification requirements. When a certification test changes and we produce an upgrade for the certification program, we offer our customers free upgrades on their interactive DVD's for up to 1 year from date of original purchase? absolutely free!


MPC 70-340 Training Course

Online Course:£210 ex. VAT
DVD Study Kit: £210 ex. VAT
List Price: £595  
Online Library: 95% off

1yr Unlimited Online Access to 143 Courses
Save 95%

      What's included in each option?

mcse training
 ©Copyright 2009 All Rights Reserved