SCADEMY logo, back to home

Security Testing Native Code

CL-CTS

Onsite / Virtual classroom

3 days

Ends with an exam

Audience: DevelopersTesters

Preparedness: General C/C++ development, QA and testing

Exercises: Hands-on

Security Testing Native Code
Security Testing Native Code

To put it bluntly, writing C/C++ code can be a minefield for reasons ranging from memory management or dealing with legacy code to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your applications right now? How likely would they be to succeed?

After getting familiar with the common weaknesses and their consequences that can allow hackers to attack your system, participants learn about the general approach and the methodology for security testing, and the techniques that can be applied to reveal specific vulnerabilities. Security testing should start with information gathering about the system (ToC, i.e. Target of Evaluation), then a thorough threat modeling should reveal and rate all threats, arriving to the most appropriate risk analysis-driven test plan.

Security evaluations can happen at various steps of the SDLC, and so we discuss design review, code review, reconnaissance and information gathering about the system, testing the implementation and the testing and hardening the environment for secure deployment. Many different security testing techniques are introduced in details, like taint analysis and heuristics-based code review, static code analysis or fuzzing. Various types of tools are introduced that can be applied in order to automate security evaluation of software products, which is also supported by a number of exercises, where we execute these tools to analyze the already discussed vulnerable code.

This course prepares testers and QA staff to adequately plan and precisely execute security tests for applications written in C or C++, select and use the most appropriate tools and techniques to find even hidden security flaws, and thus gives essential practical skills that can be applied on the next day working day.

Having secure applications will give you a distinct edge over your competitors. It is your choice to be ahead of the pack – take a step and be a game-changer in the fight against cybercrime.


Outline

IT security and secure coding

x86 machine code, memory layout and stack operations

Buffer overflow

Common coding errors and vulnerabilities

Denial of service

Security testing

Security testing techniques and tools

Deployment environment

Principles of security and secure coding

Knowledge sources


Participants attending this course will

Understand basic concepts of security, IT security and secure coding

Realize the severe consequences of unsecure buffer handling

Understand the architectural protection techniques and their weaknesses

Learn about typical coding mistakes and how to avoid them

Be informed about recent vulnerabilities in various platforms, frameworks and libraries

Learn about denial of service attacks and protections

Understand security testing approaches and methodologies

Get practical knowledge in using security testing techniques and tools

Learn how to set up and operate the deployment environment securely

Get sources and further readings on secure coding practices




Instructor-led courses
Instructor-led courses

Handle complex subjects, provide practical skills training, and hands-on experience, enable discussion and collaboration, and maintain the motivation and accountability of learners.

 Large-scale trainings
Large-scale trainings

Courses with couple of thousands of participants to be conducted in a short time frame, in any time zone, on-site or online.

Academic knowledge, practical application
Academic knowledge, practical application

Utilzing our R&D&I we combine academic knowledge with practical application, we develop and tailor courses to latest trends and clients' needs.

Proprietary platform with virtual machines
Proprietary platform with virtual machines

We use our proprietary platform with virtual machines for a safe practice, coding, and experimentation environment.

Hi SCADEMY Team,

My name isand my email is
I'd like to get more information aboutcourse for
The number of people would participate in the course
Man and woman
Find us here:

Budafoki street 187-189.
Budapest, 1117, Hungary

+36 1 205 3098

These courses could interest you, too:

Go to full course catalog

Trusted by top companies and brands:

EvosoftAirbusKnorr-BremseGE HealthCareEricssonSiemensNokiaBMW GroupLenovoConaxNAGRAAtosBeldenCode42VolvoElektrobitAXAKongsbergEvosoftAirbusKnorr-BremseGE HealthCareEricssonSiemensNokiaBMW GroupLenovoConaxNAGRAAtosBeldenCode42VolvoElektrobitAXAKongsberg