Virtual Masterclass: Secure Coding Techniques using .NET

På kurset lærer og afprøver du alle de vigtigste .NET sikkerhedsfunktioner (med særligt fokus på web-applikationer), ved at hacke applikationer og gennemgå koden med sikkerhed i tankerne. Vi starter med at tale om sikkerhed som en proces – der dækker de vigtigste aspekter af nyeste Microsoft SDL vejledning, værktøjer, arkitektur og design praksis. Undervisningen foregår på engelsk.

Form virtual delivery

Before you participate on a virtual course, we always try to arrange a 15-20 minute test session with the participants a week before to make sure that everyone is capable to attend the Masterclass. Below you will find the technical requirements for connecting to the virtual training:
  • A computer with a stable internet connection (preferably Windows or Mac OS)
  • Permissions for outgoing RDP connections to external servers (to our lab environment) – port 3389
  • A headset (headphones + microphone)
  • Webcam (built-in or plug-in)
  • Additional monitor will be helpful but it’s not required

Then we will go through everything that each .NET developer needs to know about secure coding practices with newest tools and services (Visual Studio 2017, TFS 2018 or Azure DevOps). We will spend most of our time talking about securing ASP.NET applications and issues frequently observed. You will learn about OWASP TOP 10 – most critical web application security vulnerabilities, see them in practice (in ASP.NET) and mitigate the risks.

We will see how to hack web applications by using various techniques and learn how to prevent those risks. You will learn about the latest version of ASP.NET Identity – modern framework for securing ASP.NET applications. We will cover fundamentals of ASP.NET Web API and see modern ways of protecting them by OAUTH 2, OpenID and claims-based authentication. At the end you will see how to put all the knowledge in practice to conduct code reviews.



Module 1: Security as a process
  • Microsoft Security Development Lifecycle fundamentals (v 5.2)
  • Threat modeling
  • SDL Process Template for TFS 2018
Module 2: .NET Security Features
  • Code Access Security and other security features in .NET 4.7
  • Security features of .Net Core
  • Encryption
  • Protecting data
  • Obfuscation
  • Secure coding guidelines
Module 3: General web application security issues
  • OWASP TOP 10 by example
  • Hacking your web application
Module 4: SQL Security
  • SQL Server security features
  • Security and encryption in SQL Server 2017
Module 5: ASP.NET Security Features
  • ASP.NET MVC security
  • Web Forms security
  • ASP.NET Identity
Module 6 Securing Web APIs
  • ASP.NET Web API 2 fundamentals, OWIN
  • Web API Security
  • OAUTH 2, OpenID Connect
  • JWT, claims-based authentication, federated authentication
Module 7: Secure Web API Clients
  • Fundamentals and security of AngularJS applications
  • Mobile applications security
Module 8: Code reviews
  • Conducting a code review - in practice
  • Security checklists
  • Code reviews - lessons learned
  • Working with Azure DevOps


Exercises, presentation slides with notes

CPE Point (Continuing professional education)

It will be possible to earn CPE points after completion this course.


Michael Jankowski-Lorek is a data scientist, solution architect, developer and consultant. He designs and implements solutions for Databases, data analysis and natural language processing. Michael is interested in Big data, High Availability and real time analytics especially when combined with machine learning and artificial intelligent or natural language processing.


Przemyslaw Tomasik
Przemyslaw Tomasik is CQURE’s Cybersecurity Expert with over 15 years of IT experience, focusing the last decade on security and compliance. He has worked for financial, ecommerce,and hospitality industry in Fortune 500 companies. In 2017 he opened a new chapter in his IT career – educating in security. Thanks to his practical and current knowledge, he conducts training in an interesting and accessible way, focusing on current trends.

Har du faglige spørgsmål, så kontakt:
Andre kigger også på