Code Access Security & Cryptography in .NET

Intermediate
  • 14 videos | 1h 5m 8s
  • Includes Assessment
  • Earns a Badge
Rating 3.7 of 15 users Rating 3.7 of 15 users (15)
Discover how to configure Code Access Security (CAS) and cryptography in your .NET applications. Learn how to secure data access and your ASP.NET web forms. This course introduces you to ASP.NET Code Access Security (CAS), security-transparent code in .NET, partially trusted code in .NET, link demands and CAS, CAS configuration, the .NET cryptography model, encryption keys for .NET, encryption and decryption in .NET, data integrity hash codes, common threats, security tools, ASP.NET web forms, and Windows .NET authentication. Finally, as a review exercise, you will identify three of the top ten OWASP threats to .NET apps.

WHAT YOU WILL LEARN

  • Recognize the main features of cas
    Demonstrate how to use transparency as an enforcement mechanism
    Configure your .net application to use partially trusted code
    Identify the relationship between link demands and cas
    Configure code access security in a .net application
    Recognize the main features of the .net cryptography model
    Configure data encryption using keys
  • Recognize the process for encrypting and decrypting data
    Specify how to use hash codes in a .net application
    Identify common threats to .net applications
    List and describe common security tools to be used with .net
    Create secure asp.net web forms
    Adding windows authentication to asp.net
    Use secure coding techniques to create a .net application

IN THIS COURSE

  • 4m 53s
    After completing this video, you will be able to recognize the main features of a Computer Algebra System. FREE ACCESS
  • 4m 38s
    In this video, you will learn how to use transparency as a means of enforcement. FREE ACCESS
  • Locked
    3.  Working with Partially Trusted Code in .NET
    3m 18s
    Learn how to configure your .NET application to use code that is not fully trusted. FREE ACCESS
  • Locked
    4.  Link Demands and CAS
    4m 43s
    Learn how to identify the relationship between link demands and the Code Access Security. FREE ACCESS
  • Locked
    5.  CAS Configuration
    6m 34s
    Learn how to configure Code Access Security in a .NET application. FREE ACCESS
  • Locked
    6.  The .NET Cryptography Model
    3m 9s
    After completing this video, you will be able to recognize the main features of the .NET cryptography model. FREE ACCESS
  • Locked
    7.  Using Keys for Encryption in .NET
    3m 59s
    In this video, you will learn how to configure data encryption using keys. FREE ACCESS
  • Locked
    8.  Encrypting and Decrypting Data in .NET
    4m 17s
    Upon completion of this video, you will be able to recognize the process for encrypting and decrypting data. FREE ACCESS
  • Locked
    9.  Using Hash Codes for Data Integrity in .NET
    4m 42s
    Upon completion of this video, you will be able to specify how to use hash codes in a .NET application. FREE ACCESS
  • Locked
    10.  Common Threats to .NET
    5m 19s
    Find out how to identify common threats to .NET applications. FREE ACCESS
  • Locked
    11.  Security Tools for .NET
    4m 6s
    Upon completion of this video, you will be able to list and describe common security tools to be used with .NET. FREE ACCESS
  • Locked
    12.  Securing ASP.NET Web Forms
    7m 37s
    In this video, you will learn how to create secure ASP.NET web forms. FREE ACCESS
  • Locked
    13.  Windows Authentication in .NET
    5m 19s
    In this video, you will add Windows authentication to ASP.NET. FREE ACCESS
  • Locked
    14.  Exercise: Creating a Secure .NET Application
    2m 34s
    In this video, you will learn how to use secure coding techniques to create a .NET application. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 239 users Rating 4.6 of 239 users (239)
Rating 4.7 of 27 users Rating 4.7 of 27 users (27)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 68 users Rating 4.6 of 68 users (68)
Rating 4.2 of 6 users Rating 4.2 of 6 users (6)
Rating 4.5 of 4593 users Rating 4.5 of 4593 users (4593)