Email Us   Phone : 503-259-0312   
  Home    |    Instructor-led Training    |    Self-Paced Learning    |    Online Training     

Contact Us   -   Why Choose Wintrac   -   Clients    

Order CD-ROMs   Order Videos 
.NET Security
with Mary Chipman & Andy Baron

View Course Outline

In this course, you'll learn about the security features in .NET. You'll gain an understanding of the new security architecture in the .NET Framework, and about Code Access Security in the Common Language Runtime. You'll explore how to administer security policy using visual and command-line tools. You also learn how to write script to implement security.

Course includes 45+ hours of total training time...

  • 11 CDs
  • Over 15 hours of media run time
  • Over 700 pages of courseware on CD-ROM
  • Step-by-step hands-on-labs
  • Sample code
Format Sessions Retail Price
.NET Security

 11 CD-ROMs

CD-ROM & Books

 11 CD-ROMs + Printed Books

Read about Mary Chipman & Andy Baron.
Course Outline (Outlines are subject to change.)

.NET Security

Sessions Run Time Pages
11 CDs 15 hours 700

.NET revolutionizes application security by providing the framework for developing secure Windows and Web applications. This course teaches you the basic concepts underlying Code Access Security, role-based security, and how to implement security in your applications to protect your code and your users against attack.

In this course you will learn how to..

  • Administer security policy.
  • Create and digitally sign assemblies.
  • Validate data and handle errors safely.
  • Choose the right permission set for your code.
  • Manage Windows security.
  • Use Windows role-based security in your applications.
  • Work with Isolated Storage.
  • Secure your ASP.NET applications effectively.
  • Implement ASP.NET security using SQL Server.
  • Implement COM+ security with Serviced Components.
  • Secure Remoting with IIS and ASP.NET.
  • Create secure Web Services.
  • Deploy security policy and secure applications.
  • Understand Cryptography in .NET.
  • Handle common threats like buffer overflows, SQL injection and cross-site scripting.


Overview of Security in .NET

  • Security as a System
  • Security in .NET
  • Designing Secure Systems

Security Administration

  • Security Policy in the CLR
  • Configuring Policy


Security Administration (continued)

  • Working with Command Line Tools
  • Other Security Tools

Creating Secure Assemblies

  • Assembly Overview
  • Exception Handling
  • Protecting Source Code
  • Coding Best Practices

Digging into Code Access Security

  • Permission Requests


Digging into Code Access Security (continued)

  • Permission Requests (continued)
  • Determining Effective Permissions

Understanding and Using Windows Security

  • Windows Security Basics
  • DACLs and .NET

Role-Based Security for Windows Applications

  • Role-Based Security Overview
  • .NET Security Classes
  • Implementing Application Security


Role-Based Security for Windows Applications (continued)

  •  Implementing Application Security (continued)

Isolated Storage

  • Understanding Isolated Storage
  • Mechanics of Isolated Storage
  • Types of Isolation
  • Administering Isolated Storage


Securing SQL Server Data

  • Installing SQL Server
  • SQL Server in Visual Studio .NET
  • SQL Server Security Architecture


ASP.NET Security

  • ASP.NET Security Overview
  • Windows Authentication
  • Forms Authentication


ASP.NET Security (continued)

  • Custom Authentication

Enterprise Services

  • Enterprise Services Overview


Enterprise Services (continued)

  • Creating Serviced Components
  • Administering COM+ Security
  • Testing the Inventory Application

Security for .NET Remoting

  • .NET Remoting Overview
  • Hosting Remoting in ASP.NET


Security for .NET Remoting (continued)

  • Secure Remoting with IIS and ASP.NET

Web Services

  • Web Services Overview
  • Disabling Unwanted Protocols
  • Secure Web Services with IIS and ASP.NET


Web Services (continued)

  • Secure Web Services with IIS and ASP.NET (cont.)


  • Deploying Security Policy
  • No-Touch Deployment
  • .NET Deployment Options
  • Deploying ASP.NET Applications

Cryptography in .NET

  • Basic Cryptographic Concepts
  • Working with Data


Cryptography in .NET (continued)

  • Using Asymmetric Cryptography
  • Hash Codes
  • Digital Signatures
  • Creating Random Keys

Handling Common Threats

  • Thinking About Security
  • Buffer Overflows
  • SQL Injection
  • Cross-Site Scripting
  • Keeping Current
  • The Human Element

back to top

Your Instructor
Andy Baron and Mary Chipman
Andy Baron and Mary Chipman are co-authors and your instructors. They are both Senior Consultants with MCW Technologies, a Microsoft Certified Solution Provider. Mary and Andy specialize in database application development, training, and writing about SQL Server, Visual Basic, the .NET framework and related technologies. They are Contributing Editors at Advisor Media and at Pinnacle Publishing, contributing writers for SQL Magazine, and frequent speakers at industry conferences. Mary and Andy have both received Microsoft's Most Valuable Professional (MVP) award every year since 1995, based on their contributions to Microsoft's online support newsgroups. They are co-authors of The Access Developer's Guide to SQL Server, published by Sams, and Mary co-authored SQL Server 7.0 in Record Time, published by Sybex.

back to top

About us
Contact us
Careers at Wintrac
Our Clients
Why Wintrac

Register for a free training CD-ROM drawing
Refer a client or instructor and earn $$$

Wintrac Inc.
16523 SW McGwire Ct.
Beaverton OR 97007
© Wintrac, Inc. All rights reserved.                                                                               Site Map   |   Terms of Use   |   Privacy Policy