YoVDO

Tools and Procedures for Securing .Net Applications

Offered By: YouTube

Tags

Conference Talks Courses .NET Courses Encryption Courses Application Security Courses Security Breaches Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore essential tools and procedures for securing .NET applications in this conference talk from BSides Cleveland 2018. Delve into topics such as encryption, decryption, points of entry, active defense monitoring, and out-of-bounds cost triggers. Learn about security breach strategies and gain insights into creating an effective security checklist. Discover the motives behind cyber attacks and understand how to implement robust security measures in your .NET projects.

Syllabus

Tools and Procedures for Securing .Net Applications
Housekeeping
About Me
Cleveland C#/VB.Net User Group
What are the motives?
Dotfuscator
Encrypt/Decrypt
Points of Entry?
Engage User
Active Defense Monitoring
Out of Bounds Cost Trigger
Security Breech Strategy
Security Check List
Conclusion
References
Contact Info


Related Courses

Introduction to Functional Programming
Delft University of Technology via edX
MongoDB for .NET Developers
MongoDB University
基于.Net的Web开发技术
Xi'an Jiaotong University via Coursera
Web Development with ASP.NET C# and Entity Framework Code-First
Canvas Network
Blazor and JavaScript Interoperability
Coursera Project Network via Coursera