YoVDO

Tools and Procedures for Securing .Net Applications

Offered By: YouTube

Tags

Conference Talks Courses .NET Courses Encryption Courses Application Security Courses Security Breaches Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore essential tools and procedures for securing .NET applications in this conference talk from BSides Cleveland 2018. Delve into topics such as encryption, decryption, points of entry, active defense monitoring, and out-of-bounds cost triggers. Learn about security breach strategies and gain insights into creating an effective security checklist. Discover the motives behind cyber attacks and understand how to implement robust security measures in your .NET projects.

Syllabus

Tools and Procedures for Securing .Net Applications
Housekeeping
About Me
Cleveland C#/VB.Net User Group
What are the motives?
Dotfuscator
Encrypt/Decrypt
Points of Entry?
Engage User
Active Defense Monitoring
Out of Bounds Cost Trigger
Security Breech Strategy
Security Check List
Conclusion
References
Contact Info


Related Courses

Cybersecurity Warrior Certification: Cybersecurity Immersion
Udemy
Segurança da Informação 2023 - Proteja-se de hackers
Udemy
On the Economics of Offline Password Cracking
IEEE via YouTube
Tales from Professional Thieves
BruCON Security Conference via YouTube
Red Hat Security in a Post-Shellshock World
Red Hat via YouTube