Course Overview
In our connected world, networked applications are more exposed to cyberattacks than ever – therefore, securing the communication between the system’s components is extremely important.
This course focuses on the “whys” and “hows” of secure communication. It provides foundational knowledge about essential cryptographic algorithms and their usage (hashing, encryption, digital signatures, PKI), and puts them into practice in a TCP/IP environment through practical exercises. Starting from the use of secure sockets and TLS certificate management, you’ll see a systematic overview of network attacks on each layer of the OSI model from data link to application. This includes classic attacks against IPv4 and IPv6 networks like ARP and NDP spoofing, DHCP starvation and SYN floods as well as more modern application-layer attacks such as DNS cache poisoning and Slowloris.
Of course the course also covers appropriate best practices and recommendations to prevent these attacks, from secure switch configuration to secure operating system settings and the proper use of secure protocols on each layer.
Because even if you don’t know about these attacks, the hackers certainly will!
Who should attend
Developers working on networked applications
Prerequisites
General network application development, networking basics
Course Objectives
- Getting familiar with essential cyber security concepts
- Understanding how cryptography supports security
- Understanding the most common attacks from OSI Layer 2 to Layer 7
- Using network traffic manipulation tools
Course Content
- Cyber security basics
- Cryptography for developers
- Network security
- Denial of service
- Security by design
- Wrap up