Information Security Tools and Training
Developer Training Course Objectives
Learn how to perform a security risk analysis
Learn how to analyze security across the five-layer model: application, DBMS, operating system, network, physical.
Learn how to analyze security by breaking down the client-server model – app server vs. DBMS server vs. desktop issues.
Learn the difference between authentication and authorization.
Learn how to use Penn’s Kerberos implementation.
Learn about encryption algorithms and protocols and when and how to use them.
Learn when and how to apply network security solutions: firewalls, virtual private networks.
Learn how to avoid common security programming errors – buffer overflows, failure to check user data, insufficient logs, race conditions.