What Is Programming? And How To Get Started
January 28, 2025
Article
Recommended experience
Intermediate level
Ideal for ASP.NET developers, and IT professionals who want to enhance their security knowledge. A basic understanding of ASP.NET is recommended.
Recommended experience
Intermediate level
Ideal for ASP.NET developers, and IT professionals who want to enhance their security knowledge. A basic understanding of ASP.NET is recommended.
Analyze common attacks such as XSS and SQL injection to protect against them.
Apply security tools to streamline and automate security tests.
Create contemporary security controls for robust software design.
Develop your first app promptly through a step-by-step guided program.
Add to your LinkedIn profile
September 2024
3 assignments
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
Unlock the potential of secure ASP.NET development with this course designed to arm you with essential skills for writing secure code. Begin your journey by setting up your environment and understanding the fundamental differences between .NET Core and .NET Framework. Progress to identifying and mitigating common vulnerabilities such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF).
Explore the intricacies of identity management, session hijacking, and parameter manipulation, learning how to safeguard your applications from these threats. Dive deep into advanced topics like cryptography, secure authentication, and data access, ensuring that your applications not only perform well but also withstand sophisticated cyber-attacks. Hands-on modules provide practical experience, allowing you to play the role of both developer and hacker, understanding vulnerabilities from both perspectives. By the end of this course, you will have a robust understanding of secure coding practices, equipped to build resilient and secure ASP.NET applications. This course is ideal for ASP.NET developers, software engineers, and IT professionals who want to enhance their security knowledge and protect their applications from vulnerabilities. A basic understanding of ASP.NET is recommended.
In this module, we will introduce you to the fundamentals of .NET Core, a powerful and versatile cross-platform framework. You'll gain insight into the history and evolution of .NET Core, set up your development environment, and explore the differences between .NET Core and .NET Framework. Finally, you'll build your first .NET Core application, putting theory into practice and setting a solid foundation for future learning.
6 videos1 reading
In this module, we will delve into various security vulnerabilities that can affect .NET Core applications. You'll learn about SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF) attacks, understanding how they occur and how to prevent them. We will also explore directory traversal, unvalidated redirects, session hijacking, parameter manipulation, and security misconfigurations. Additionally, you’ll discover the risks associated with file uploads and insecure cryptographic storage. By the end of this module, you will have hands-on experience with these vulnerabilities, equipping you with the skills to safeguard your applications against potential threats.
12 videos1 assignment
In this module, we will explore various mitigation strategies to fortify your .NET Core applications against sophisticated cyber-attacks. You'll learn how to secure user inputs, handle file uploads safely, and implement protection against CSRF and XSS attacks. We will delve into the nuances of serialization and deserialization, the importance of security headers, and the implementation of CAPTCHA. Additionally, we will cover best practices for authentication, secure data access, and storage. Finally, you'll gain hands-on experience by applying mitigation techniques to various vulnerabilities, ensuring your code is both functional and secure.
11 videos
In this module, we will delve into the essential aspects of cryptography, starting with an overview of its history and evolution. You'll explore the fundamentals of symmetric encryption and various ciphers, followed by an in-depth look at asymmetric encryption and the mathematical principles behind the RSA Cryptosystem. Additionally, we will cover hashing techniques and the critical importance of digital signatures in cybersecurity. By understanding these cryptographic concepts, you will be able to implement secure encryption and hashing mechanisms in your .NET Core applications, ensuring robust protection of sensitive data.
4 videos2 assignments
Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Board Infinity
Course
Infosec
Specialization
Microsoft
Course
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.
You will be eligible for a full refund until two weeks after your payment date, or (for courses that have just launched) until two weeks after the first session of the course begins, whichever is later. You cannot receive a refund once you’ve earned a Course Certificate, even if you complete the course within the two-week refund period. See our full refund policy.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.