EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer EC-Council Certified Secure Programmer
Page 2E|C S PTMEC-CouncilCertifiedSecure Programmerhttp://www.eccouncil.orgEC-Council
Course DescriptionEC-Council Certifi ed Secure Programmer lays the basic foundation required by all application developersand development organizations to produce applications with greater stability and posing lessersecurity risks to the consumer. The Certified Secure Application Developer standardizes the knowledgebase for application development by incorporating the best practices followed by experienced experts inthe various domains.Page 3The distinguishing aspect of ECSP is that unlike vendor or domain specific certifications, it exposes theaspirant to various programming languages from a security perspective. This drives greater appreciationfor the platform / architecture / language one specializes on as well as an overview on related ones.Who Should AttendThe ECSP certifi cation is intended for programmers who are responsible for designing and buildingsecure Windows/Web based applications with .NET/Java Framework. It is designed for developers whohave C#, C++, Java, PHP, ASP, .NET and SQL development skills.PrerequisitesYou must have programming fundamental knowledge.Duration5 days (9:00 – 5:00)CertificationThe ECSP 312-92 exam will be conducted on the last day of training. Students need to pass the onlinePrometric exam to receive the ECSP certification.http://www.eccouncil.orgEC-Council
- Page 1: Page 1EC-Council CertifiedSecure Pr
- Page 8 and 9: • Microsoft SDL Threat Modeling T
- Page 11 and 12: • Countermeasure against Buffer O
- Page 13 and 14: • Using Variable Arguments Proper
- Page 15 and 16: o Code for GSS Client• Java Serve
- Page 17 and 18: • .NET Frameworko .NET Framework
- Page 19: o Design Considerationso Applicatio
- Page 22 and 23: Page 22o Web Application Fingerprin
- Page 24 and 25: Page 24• SQL Server Security Mode
- Page 26 and 27: Page 26• SQL Server 2005o Step 1:
- Page 28 and 29: Page 28• Application Configuratio
- Page 30 and 31: Page 30• Preventing Automatic Sub
- Page 32 and 33: • Validation Process in XML• XM
- Page 34 and 35: • Preventing Repurposing• SiteL
- Page 36 and 37: Page 36• Authorization Controls
- Page 38 and 39: Page 38Module 22: Secure Xcode Prog
- Page 40 and 41: Page 40• Obfuscation Sample Code
- Page 42 and 43: Page 42• Starting a Winsock 2 API
- Page 44 and 45: Page 44• The Bind System Call•
- Page 46 and 47: Page 46• Figures: Fake Chunk, Ove
- Page 48 and 49: Page 48• The wiretap Library• A
- Page 50 and 51: Page 50• Security and Trust Servi
Page 2E|C S PTM<strong>EC</strong>-<strong>Council</strong><strong>Certified</strong><strong>Secure</strong> <strong>Programmer</strong>http://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>