SCADEMY logo, back to home

Secure Coding Master Course for Telecoms

CL-ITELC

Onsite / Virtual classroom

5 days

Ends with an exam

Audience: DevelopersTestersProfessionals

Preparedness: Advanced Java, Web and C/C++ development

Exercises: Hands-on

Secure Coding Master Course for Telecoms
Secure Coding Master Course for Telecoms

Telecommunication is the foundation on which critical infrastructures are built – all modern technologies heavily rely on its security. The continued adoption of IP-based telecommunication and the exposure of telecom equipment opens additional paths for attackers, with a massive increase in security incidents against telecom systems.

The security of customer premises equipment and the prevalence of Internet of Things (IoT) devices is especially critical, as these devices are directly exposed to attackers and potentially resulting in large-scale attacks against users and companies alike. IoT security is recognized by the industry as a critical area of telecommunications, as evidenced by the efforts of the GSM Alliance to produce a set of IoT security guidelines for network operators.

The threats against telecom systems run the gamut from simple-yet-effective DDoS attacks to large-scale exploitation of vulnerabilities in communication equipment. Ultimately, the best way to deal with these challenges, you need motivated secure coders with the right skills and the right attitude to fight security problems: a skilled team of software and network engineers.

This training program exclusively targets engineers developing software applications or network equipment for the healthcare sector. Our dedicated trainers share their experience and expertise through hands-on labs, and give real-life case studies from the telecom industry – engaging participants in hands-on labs to realize the harsh consequences of insecure coding.

Our dedicated trainers share their experience and expertise through hands-on labs, and give real-life case studies from the telecom industry – engaging participants in hands-on labs to realize the harsh consequences of insecure coding.


Outline

IT security and secure coding

Special threats in the telecom sector

Regulations and standards

Web application security

Client-side security

Practical cryptography

Network security

Common coding errors and vulnerabilities

Foundations of Java security

Secure communication in Java

Java security services

x86 machine code, memory layout and stack operations

Buffer overflow

Some additional native code-related vulnerabilities

Denial of service

Principles of security and secure coding

Knowledge sources


Participants attending this course will

Understand basic concepts of security, IT security and secure coding

Understand special threats in the telecom sector

Understand regulations and standards

Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them

Learn about XML security

Learn client-side vulnerabilities and secure coding practices

Have a practical understanding of cryptography

Learn about network attacks and defenses at different OSI layers

Learn about typical coding mistakes and how to avoid them

Get information about some recent vulnerabilities in the Java framework

Learn to use various security features of the Java development environment

Understand security concepts of Web services

Realize the severe consequences of unsecure buffer handling

Understand the architectural protection techniques and their weaknesses

Learn about denial of service attacks and protections

Get sources and further readings on secure coding practices






Instructor-led courses
Instructor-led courses

Handle complex subjects, provide practical skills training, and hands-on experience, enable discussion and collaboration, and maintain the motivation and accountability of learners.

 Large-scale trainings
Large-scale trainings

Courses with couple of thousands of participants to be conducted in a short time frame, in any time zone, on-site or online.

Academic knowledge, practical application
Academic knowledge, practical application

Utilzing our R&D&I we combine academic knowledge with practical application, we develop and tailor courses to latest trends and clients' needs.

Proprietary platform with virtual machines
Proprietary platform with virtual machines

We use our proprietary platform with virtual machines for a safe practice, coding, and experimentation environment.

Hi SCADEMY Team,

My name isand my email is
I'd like to get more information aboutcourse for
The number of people would participate in the course
Man and woman
Find us here:

Budafoki street 187-189.
Budapest, 1117, Hungary

+36 1 205 3098

These courses could interest you, too:

Go to full course catalog

Trusted by top companies and brands:

EvosoftAirbusKnorr-BremseGE HealthCareEricssonSiemensNokiaBMW GroupLenovoConaxNAGRAAtosBeldenCode42VolvoElektrobitAXAKongsbergEvosoftAirbusKnorr-BremseGE HealthCareEricssonSiemensNokiaBMW GroupLenovoConaxNAGRAAtosBeldenCode42VolvoElektrobitAXAKongsberg