Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Tools and Procedures for Securing .Net Applications

via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore essential tools and procedures for securing .NET applications in this conference talk from BSides Cleveland 2018. Delve into topics such as encryption, decryption, points of entry, active defense monitoring, and out-of-bounds cost triggers. Learn about security breach strategies and gain insights into creating an effective security checklist. Discover the motives behind cyber attacks and understand how to implement robust security measures in your .NET projects.

Syllabus

Tools and Procedures for Securing .Net Applications
Housekeeping
About Me
Cleveland C#/VB.Net User Group
What are the motives?
Dotfuscator
Encrypt/Decrypt
Points of Entry?
Engage User
Active Defense Monitoring
Out of Bounds Cost Trigger
Security Breech Strategy
Security Check List
Conclusion
References
Contact Info

Reviews

Start your review of Tools and Procedures for Securing .Net Applications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.