Our MCP 70 340 course provides students with a thorough grounding in Microsoft .NET security implementation and general development security best practices. This course will prepare a student to take the Implementing Security for Applications exam (available in Microsoft Visual Basic .NET 70-330 and Microsoft Visual C# 70-340).
Our MCP 70 340 courseware videos will ensure that you receive the knowledge you require to successfully grasp Applications Security technology. Our Instructor-led training is interactive and presented via the Internet or locally via CD-ROM.
This is the best time to take advance you career, increased salary, job satisfaction and job security in the IT industry as demand for qualified people continues to grow despite the growing concerns of the UK economy. As a major force in IT training, we have launched a full range of new IT career track training courses. Get the convenience and affordability of MCP 70 340 computer-based training with the effectiveness of instructor-led training. Our training for MCP 70 340 gives you quick, effective learning tools for learning Applications Security technology. The self-paced study format includes hands-on interactive exercises and practice test questions.
NOTE: All prices (above) are stated in Great British Pounds (£) and EXCLUDE any external examination fees. All prices are +VAT for EU sales
To view the total price including VAT, simply click the "buy" and "checkout" buttons, then select your country.
Develop code under a least privilege account within the development environment.
Configure the Microsoft .NET development environment and operating system.
Select the appropriate privileges.
Develop code that runs under a least privilege account at run time.
Develop code to run under a least privilege account that does not have administrator privileges.
Use least privilege for access to resources such as the file system, registry entries, and databases.
Analyze security implications of calling unknown code. Third-party components include .NET components, legacy COM components, ActiveX controls, Win32 DLLs, and Web services.
Write code to verify that the identity of a COM component matches the identity expected.
Validate that data to and from third-party components conforms to the expected size, format, and type.
Test for integrity of data after transmission.
Evaluate unmanaged code.
Write code that addresses failures in a manner that does not compromise security.
Write code that defaults to a permission set that is more secure than the permission set that existed before the errors or issues occurred.
Create error messages that do not compromise security.
Develop code that includes security measures in each tier of the solution, also known as defense in depth.
Implement application functionality to apply defaults that minimize security threats.
Write code to prevent canonicalization problems.
Create canonical references for resources.
Validate that a reference is canonical.
Validate external input at every boundary level to prevent security problems.
Write code to test strings by using regular expressions.
Write code to test the size of data.
Write code to prevent SQL injection and cross-site scripting.
Implement security by using application domains.
Implement authentication.
Implement a custom authentication mechanism in a Windows Forms application.
Implement an appropriate Web application or Web service authentication mechanism to accommodate specific application security requirements.
Implement functionality by consuming authenticated user information such as the IPrincipal, Membership, and Identity components of the .NET base class library.
Write authorization code.
Programmatically control access to functionality and data by using user information such as user identity, group membership, and other custom user information.
Control access to Web applications by using URL authorization.
Programmatically control access to functionality and data by using identities or criteria that are independent of user identity.
Sign data by using certificates.
Implement data protection.
Use .NET cryptographic techniques.
Encrypt and decrypt data by using symmetric and asymmetric cryptographic functions.
Compute hashes by using cryptographic functions.
Write code to create cryptographically random numbers for cryptographic functions.
Protect data in files and folders by creating, modifying, and deleting discretionary access control list (DACL) or security access control list (SACL) entries.
Encrypt and decrypt data by using the Data Protection API (DPAPI).
Implement security for an application or shared library by using .NET code access security.
Demand a code access permission such as FileIOPermission.
Group code access permissions into a permission set.
Override code access security checks.
Protect a resource in a library.
Specify the permission requests of an application.
Customize code access security.
Access remote functionality in a manner that minimizes security risks.
Use Web Services Enhancements (WSE) for Microsoft .NET, such as WS-Security and WS-Interoperability.
Configure .NET Remote for security.
Work with .NET security policies. Tools include the .NET Framework Configuration tool and the Code Access Security Policy tool.
Analyze the code access permissions of an assembly by using the Permissions View tool.
Configure security by using IIS and ASP.NET.
Understand the security implications of impersonation.
Configure ASP.NET impersonation.
Configure Web folder permissions.
Set appropriate permissions on Web application files.
Configure a Web page or Web service to use SSL/TLS.
Perform unit testing on applications and components to identify security vulnerabilities.
Release applications in a manner that minimizes security risks.
Evaluate when to sign an assembly.
Implement delayed signing.
Create a strong named assembly.
Configure security settings by using the .NET Framework Configuration tool and the Code Access Security Policy tool at deployment.
After Effects CS3 Training After Effects CS4 Training Encore CS3 Training Premiere CS3 Training Premiere CS4 Training Soundbooth CS3 Training Soundbooth CS4 Training