· Overview of the requirements
· Overview of Cryptology
· Symmetric encryption
· Asymmetric encryption
· Digital signatures
· Digital certificates
· How encryption and hash function are used to address these requirements
· XML-Encryption (for web services)
· XML-Digital signatures (for web services)
· Overview of the requirements
· The different technologies used for user authentication
· Passwords including Password Management
· Challenge-Response authentication and Challenge-Response tokens
· One-Time Passwords (OTP) and OTP tokens
· Smart-cards and Public-Key technology
· Biometric authentications
· SAML (for web services)
· Overview of the requirements
· Implementation of authorization mechanisms in the application layer
· Discretionary Access Control (DAC)
· Mandatory Access Control (MAC)
· Role Based Access Control (RBAC)
· Overview of the requirements
· Central logging
· Auditing and log analysis
· Security in the design stage
· Secure coding
· Security testing
· Risk analysis and Threat Modeling
· Application coding vulnerabilities
· In Java (J2EE)
· In .NET
· J2EE
· .NET
· Summary
· Q&A
· Evaluation