EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer EC-Council Certified Secure Programmer
Page 40• Obfuscation Sample Code• Encryption Using DBMS_CRYPTO• Advanced Security Option• Row Level Security• Oracle Database Vaults: Tool• Auditing• Auditing Methods• Audit Options• View Audit Trail• Fine-Grained Auditing (FGA)• Oracle Auditing Tools• Testing PL/SQL Programs• SQL Unit Testing Toolso SPUnito TSQLUnitoutPLSQL• Steps to Use utPLSQLModule 24: Secure Network Programming• Basic Network Concepts:o Networko Protocolso Client Server Model• Basic Web Concepts• Network Programming• Benefits of Secure Network Programming• Network Interfacehttp://www.eccouncil.orgEC-Council
• Securing Sockets:o Server Programo Client Program• Ports• UDP Datagram and Sockets• Internet Address• Connecting to secure websites• URL Decoder• Reading Directly from a URL• Content Handler• Cookie Policy• RMI Connector• .Net : Internet Authentication• Network Scanning Tool: Security Manager Plus• Network Programming Best PracticesPage 41Module 25: Windows Socket Programming• Introduction to Windows Sockets• Windows NT and Windows 2000 Sockets Architecture• Socket Programming• Client-Side Socket Programmingo The Socket Address Structure• The Socket Address Structure Code Analysis• Initializing a Socket and Connecting• Server-Side Socket Programming• Creating a Server• Winsock 2.0• Winsock Linking Methodshttp://www.eccouncil.orgEC-Council
- Page 1 and 2: Page 1EC-Council CertifiedSecure Pr
- Page 3: Course DescriptionEC-Council Certif
- Page 8 and 9: • Microsoft SDL Threat Modeling T
- Page 11 and 12: • Countermeasure against Buffer O
- Page 13 and 14: • Using Variable Arguments Proper
- Page 15 and 16: o Code for GSS Client• Java Serve
- Page 17 and 18: • .NET Frameworko .NET Framework
- Page 19: o Design Considerationso Applicatio
- Page 22 and 23: Page 22o Web Application Fingerprin
- Page 24 and 25: Page 24• SQL Server Security Mode
- Page 26 and 27: Page 26• SQL Server 2005o Step 1:
- Page 28 and 29: Page 28• Application Configuratio
- Page 30 and 31: Page 30• Preventing Automatic Sub
- Page 32 and 33: • Validation Process in XML• XM
- Page 34 and 35: • Preventing Repurposing• SiteL
- Page 36 and 37: Page 36• Authorization Controls
- Page 38 and 39: Page 38Module 22: Secure Xcode Prog
- Page 42 and 43: Page 42• Starting a Winsock 2 API
- Page 44 and 45: Page 44• The Bind System Call•
- Page 46 and 47: Page 46• Figures: Fake Chunk, Ove
- Page 48 and 49: Page 48• The wiretap Library• A
- Page 50 and 51: Page 50• Security and Trust Servi
- Page 52 and 53: Page 52• SSL Certificates• Veri
- Page 54 and 55: • Avoiding unvalidated redirects
• Securing Sockets:o Server Programo Client Program• Ports• UDP Datagram and Sockets• Internet Address• Connecting to secure websites• URL Decoder• Reading Directly from a URL• Content Handler• Cookie Policy• RMI Connector• .Net : Internet Authentication• Network Scanning Tool: Security Manager Plus• Network Programming Best PracticesPage 41Module 25: Windows Socket Programming• Introduction to Windows Sockets• Windows NT and Windows 2000 Sockets Architecture• Socket Programming• Client-Side Socket Programmingo The Socket Address Structure• The Socket Address Structure Code Analysis• Initializing a Socket and Connecting• Server-Side Socket Programming• Creating a Server• Winsock 2.0• Winsock Linking Methodshttp://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>