OWASP Top 10, C# Secure Coding Follow Up Training in Belgium

  • Learn via: Classroom
  • Duration: 1 Day
  • Price: Please contact for booking options
We can host this training at your preferred location. Contact us!

This course is the next step for our participants, who completed our OWASP Top 10, C# Secure Coding Fundamentals course. This is a follow up training, meaning that in order to attend this, everyone must already have the knowledge that is covered in the Fundamentals.

This course enables our participants to gain a deeper knowledge in the field, because here we emphasize the C#-specific aspects of secure coding instead of the general vulnerabilities.

At the end of the training everyone has the possibility to take an exam, where they are able to measure their level of the gained knowledge.

  • Learn client-side vulnerabilities and secure coding practices
  • Learn to use various security features of the .NET development environment
  • Have a practical understanding of cryptography

  • Client-side security
  • .NET security architecture and services
  • Practical cryptography



Client-side security

  • JavaScript security
  • Same Origin Policy
  • Simple requests
  • Preflight requests
  • Clickjacking
    • Clickjacking
    • Exercise – IFrame, Where is My Car?
    • Protection against Clickjacking
    • Anti frame-busting – dismissing protection scripts
    • Protection against busting frame busting
  • AJAX security
    • XSS in AJAX
    • Script injection attack in AJAX
    • Exercise – XSS in AJAX
    • XSS protection in AJAX
    • Exercise CSRF in AJAX – JavaScript hijacking
    • CSRF protection in AJAX

.NET security architecture and services

  • .NET architecture
  • Code Access Security (optional)
    • Full and partial trust
    • Evidence classes
    • Permissions
    • Code access permission classes
    • Deriving permissions from evidence
    • Defining custom permissions
    • .NET runtime permission checking
    • The Stack Walk
    • Effects of Assert()
    • Class and method-level declarative permission
    • Imperative (programmatic) permission checking
    • Exercise – sandboxing .NET code
    • Using transparency attributes
    • Allow partially trusted callers
    • Exercise – using transparency attributes

Practical cryptography

  • Rule #1 of implementing cryptography
  • Cryptosystems
    • Elements of a cryptosystem
    • .NET cryptographic architecture
  • Symmetric-key cryptography
    • Providing confidentiality with symmetric cryptography
    • Symmetric encryption algorithms
    • Modes of operation
    • Encrypting and decrypting (symmetric)
  • Other cryptographic algorithms
    • Hash or message digest
    • Hash algorithms
    • SHAttered
    • Hashing
    • Message Authentication Code (MAC)
    • Providing integrity and authenticity with a symmetric key
    • Random number generation
      • Random numbers and cryptography
      • Cryptographically-strong PRNGs
      • Weak PRNGs in .NET
      • Strong PRNGS in .NET
      • Hardware-based TRNGs
  • Asymmetric (public-key) cryptography
    • Providing confidentiality with public-key encryption
    • Rule of thumb – possession of private key
    • The RSA algorithm
      • Introduction to RSA algorithm
      • Encrypting with RSA
      • Combining symmetric and asymmetric algorithms
      • Digital signing with RSA
      • Asymmetric algorithms in .NET
      • Exercise Sign
      • Exercise – using .NET cryptographic classes
  • Public Key Infrastructure (PKI)
    • Man-in-the-Middle (MitM) attack
    • Digital certificates against MitM attack
    • Certificate Authorities in Public Key Infrastructure
    • X.509 digital certificate


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Belgium facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
04 juli 2024
Brüksel, Brugge, Anvers
1 Day
Classroom / Virtual Classroom
07 juli 2024
Brüksel, Brugge, Anvers
1 Day
Classroom / Virtual Classroom
19 juli 2024
Brüksel, Brugge, Anvers
1 Day
Classroom / Virtual Classroom
09 augustus 2024
Brüksel, Brugge, Anvers
1 Day
Classroom / Virtual Classroom
08 augustus 2024
Brüksel, Brugge, Anvers
1 Day
Classroom / Virtual Classroom
19 augustus 2024
Brüksel, Brugge, Anvers
1 Day
Classroom / Virtual Classroom
23 augustus 2024
Brüksel, Brugge, Anvers
1 Day
Classroom / Virtual Classroom
24 augustus 2024
Brüksel, Brugge, Anvers
1 Day
OWASP Top 10, C# Secure Coding Follow Up Training Course in Belgium

Belgium, or officially known as Kingdom of Belgium, is located in Northwestern Europe. With the country's 11.5 million population, Belgium is the 6th most densely populated country in Europe. The capital and largest city is Brussels. And other major and popular cities are Antwerp, Ghent, Charleroi, Liège, Bruges, Namur, and Leuven. The population of Belgium consists mostly of Flemings and Walloons. While the Flemings speak Dutch, the Walloons speak French.

The country is known for moules frites (mussels served with french fries) as well as waffles and of course; Belgian chocolate. Chocolate is one of Belgium’s main food exports. Another thing that Belgium is known for is its beautiful city Bruges. Bruges is one of Europe’s most well-preserved medieval towns and has its beautiful canals.

At Bilginç IT Academy, we understand the unique requirements of Belgium and incorporate innovative training methodologies to meet them. Explore our extensive training catalog, featuring diverse Certification Exam preparation courses and accredited corporate training programs that will revolutionize your perception of IT training.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.