EC-Council/Certified Application Security Engineer .NET/CASE.NET

Certified Application Security Engineer .NET Certification Training Course Overview

The Certified Application Security Engineer .NET training course will train you through the application security aspect of the .Net application development..Net being one of the popular application development framework lack to cover the security aspect and most of the developers learn this on the job, hence this training course will give perfect knowhow of the application security.

Who should do Certified Application Security Engineer .NET training?

  • .NET Developers
  • Anyone aspiring to become application security engineers/analysts/testers
  • Professional developing, testing, managing, or protecting a wide area of applications
This course prepares you for Exam CASE.NET. Test your current knowledge Qubits42

Certified Application Security Engineer .NET (24 Hours) Download Course Contents

Live Virtual Classroom
Group Training 1350
02 - 04 Aug 09:00 AM - 05:00 PM CST
(8 Hours/Day)

06 - 08 Sep 09:00 AM - 05:00 PM CST
(8 Hours/Day)

1-on-1 Training (GTR) 1550
4 Hours
8 Hours
Week Days
Week End

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here Hire Our Trainers! Click here

Course Modules

Module 1: Understanding Application Security, Threats, and Attacks
  • Monitor the status of the Horizon components using the Horizon Administrator console dashboard
  • Monitor desktop sessions using the HelpDesk tool
Module 2: Security Requirements Gathering
  • Introductions and course logistics
  • Course objectives
Module 3: Secure Application Design and Architecture
  • Recognize VMware Horizon reference architecture
  • dentify the Horizon Connection Server supported features
  • Identify the recommended system requirements for Horizon Connection Serve
  • Configure the Horizon event database
  • Outline the steps for the initial configuration of Horizon Connection Server
  • Discuss the ADAM database as a critical component of Horizon Connection Server installation
Module 4: Secure Coding Practices for Input Validation
  • Compare the authentication options that Horizon Connection Server supports
  • Describe the Smartcard authentication options that Horizon Connection Server supports
  • Outline the steps to create a Horizon administrator and custom roles
  • Describe the roles available in a Horizon environment
  • Explain the role that certificates play for Horizon Connection Server
  • Install and configure certificates for Horizon Connection Server
  • Install and configure True SSO in a Horizon environment
Module 5: Secure Coding Practices for Authentication and Authorization
  • Recognize the features and benefits of Workspace ONE Access
  • Recognize the Workspace ONE Access console features
  • Explain identity management in Workspace ONE Access
  • Explain access management in Workspace ONE Access
  • Describe the Workspace ONE Access directory integration
  • Describe the Workspace ONE Access directory integration
  • Deploy virtual applications with Workspace services
Module 6: Secure Coding Practices for Cryptography
  • Describe the purpose of a replica connection server
  • Explain how multiple Horizon Connection Server instances in a pod maintain synchronization
  • Describe the 3D rendering options available in Horizon 8
  • List the steps to configure graphics cards for use in a Horizon environment
  • Configure a load balancer for use in a Horizon environment
  • Explain Horizon Cloud Pod Architecture LDAP replication and VIPA
  • Explain Horizon Cloud Pod Architecture scalability options
Module 7: Secure Coding Practices for Session Management
  • Explain concepts relevant to secure Horizon connections
  • Describe how to restrict Horizon connections.
  • Discuss the benefits of using Unified Access Gateway
  • List the two-factor authentication options that are supported by Unified Access Gateway
  • List Unified Access Gateway firewall rules
  • Describe the situation in which you might deploy Unified Access Gateway instances with one, two, or three network interfaces
Module 10: Secure Deployment and Maintenance
  • Topic details are not available.
Download Course Contents

Request More Information

Course Prerequisites

Minimum of 2 years of experience in .Net Development will be helpful

On completion of this training, you will know:

  • Understanding Application Security, Threats, and Attacks
  • Security Requirements Gathering
  • Secure Application Design and Architecture
  • Secure Coding Practices for Input Validation, Authentication and Authorization, Secure Coding Practices for Cryptography, Session Management & Error Handling
  • Static and Dynamic Application Security Testing (SAST & DAST)
  • Secure Deployment and Maintenance

FAQ's