Your privacy matters: This site uses cookies to analyze site usage and provide social media features. Learn More.

C and C++ Secure Coding

SEC-126 (3 Days)

Request Pricing

Secure Coding Training Overview

Accelebrate's C and C++ Secure Coding training teaches developers the common weaknesses that allow hackers to attack systems and the best practices needed to prevent them. Attendees learn how to manage OS memory and how to avoid C/C++ programming mistakes from the machine code level to virtual functions.

Location and Pricing

Most Accelebrate courses are delivered as private, customized, on-site training at our clients' locations worldwide for groups of 3 or more attendees and are custom tailored to their specific needs. Please visit our client list to see organizations for whom we have delivered private in-house training. These courses can also be delivered as live, private online classes for groups that are geographically dispersed or wish to save on the instructor's or students' travel expenses. To receive a customized proposal and price quote for private training at your site or online, please contact us.

Secure Coding Training Objectives

All attendees will:

  • Understand basic concepts of security, IT security, and secure coding
  • Realize the severe consequences of unsecured buffer handling
  • Understand the architectural protection techniques and their weaknesses
  • Have a practical understanding of cryptography
  • Learn about XML security
  • Learn about typical coding mistakes and how to avoid them
  • Be informed about recent vulnerabilities in various platforms, frameworks, and libraries
  • Get sources and further readings on secure coding practices

Secure Coding Training Outline

Expand All | Collapse All | Printer-Friendly

IT Security And Secure Coding
  • Nature of security
  • What is risk?
  • IT security vs. secure coding
  • From vulnerabilities to botnets and cybercrimes
X86 Machine Code, Memory Layout, and Stack Operations
  • Intel 80x86 Processors – main registers
  • Intel 80x86 Processors – most important instructions
  • Intel 80x86 Processors – flags
  • Intel 80x86 Processors – control instructions
  • Intel 80x86 Processors – stack handling and flow control
  • The memory address layout
  • The function calling mechanism in C/C++ on x86
  • Calling conventions
  • The local variables and the stack frame
  • Function calls – prologue and epilogue of a function
  • Stack frame of nested calls
  • Stack frame of recursive functions
Buffer Overflow / Stack Overflow
  • Buffer overflow on the stack
  • Overwriting the return address
Protection Against Stack Overflow
  • Specific protection methods
  • Protection methods at different layers
  • The PreDeCo matrix of software security
  • Stack overflow – Prevention (during development)
  • Stack overflow – Detection (during execution)
  • Fortify instrumentation (FORTIFY_SOURCE)
  • Exercise BOFShellcode – Fortify
Stack Smashing Protection
  • Stack smashing protection variants
  • Stack smashing protection in GCC
  • Exercise BOFShellcode – Stack smashing protection
  • Effects of stack smashing protection
Address Space Layout Randomization (ASLR)
  • Randomization with ASLR
  • Practical weaknesses and limitations to ASLR
  • Circumventing ASLR: NOP sledding
Non-Executable Memory Areas – The NX Bit
  • Access Control on memory segments
  • The Never eXecute (NX) bit
Buffer Overflow
  • Return-to-libc attack – Circumventing the NX bit protection
  • Return-oriented programming (ROP)
  • Heap overflow
  • Protection against heap overflow
Practical Cryptography
  • Rule #1 of implementing cryptography
  • Cryptosystems
  • Symmetric-key cryptography
  • Other cryptographic algorithms
  • Asymmetric (public-key) cryptography
  • Public Key Infrastructure (PKI)
XML Security
  • XML injection
  • Abusing XML Entity
Code Quality Problems
  • Dangers arising from poor code quality
  • Poor code quality – spot the bug!
  • Unreleased resources
  • Type mismatch – Spot the bug!
  • Exercise TypeMismatch
  • Memory allocation problems
  • Use after free
  • Case study - WannaCry
Common Coding Errors and Vulnerabilities
  • Input validation
  • Printf format string bug
  • Some other input validation problems
  • Path traversal vulnerability
  • Log forging
  • Case study - Shellshock
Improper Use of Security Features
  • Typical problems related to the use of security features
  • Insecure randomness
  • Password management
  • Case study – the Ashley Madison data breach
  • Typical mistakes in password management
Time and State Problems
  • Time and state-related problems
  • Serialization errors (TOCTTOU)
  • Attacks with symbolic links
  • Exercise TOCTTOU
Principles of Security and Secure Coding
  • Matt Bishop’s principles of robust programming
  • The security principles of Saltzer and Schroeder
Knowledge Sources
  • Secure coding sources – a starter kit
  • Vulnerability databases
  • Recommended books – C/C++
Conclusion
Request Pricing

Lecture percentage

50%

Lecture/Demo

Lab percentage

50%

Lab

Course Number:

SEC-126

Duration:

3 Days

Prerequisites:

All students must have C/C++ development experience.

Training Materials:

All Secure Coding training attendees receive comprehensive courseware.

Software Requirements:

A VirtualBox virtual machine with all required software will be provided.

Contact Us:

Accelebrate’s training classes are available for private groups of 3 or more people at your site or online anywhere worldwide.

Don't settle for a "one size fits all" public class! Have Accelebrate deliver exactly the training you want, privately at your site or online, for less than the cost of a public class.

For pricing and to learn more, please contact us.

Contact Us Train For Us

Toll-free in US/Canada:
877 849 1850
International:
+1 678 648 3113

Toll-free in US/Canada:
866 566 1228
International:
+1 404 420 2491

925B Peachtree Street, NE
PMB 378
Atlanta, GA 30309-3918
USA

Subscribe to our Newsletter:

Never miss the latest news and information from Accelebrate:

Microsoft Gold Partner

Please see our complete list of
Microsoft Official Courses

Recent Training Locations

Alabama

Huntsville

Montgomery

Birmingham

Alaska

Anchorage

Arizona

Phoenix

Tucson

Arkansas

Fayetteville

Little Rock

California

San Francisco

Oakland

San Jose

Orange County

Los Angeles

Sacramento

San Diego

Colorado

Denver

Boulder

Colorado Springs

Connecticut

Hartford

DC

Washington

Florida

Fort Lauderdale

Miami

Jacksonville

Orlando

Saint Petersburg

Tampa

Georgia

Atlanta

Augusta

Savannah

Idaho

Boise

Illinois

Chicago

Indiana

Indianapolis

Iowa

Ceder Rapids

Des Moines

Kansas

Wichita

Kentucky

Lexington

Louisville

Louisiana

Banton Rouge

New Orleans

Maine

Portland

Maryland

Annapolis

Baltimore

Hagerstown

Frederick

Massachusetts

Springfield

Boston

Cambridge

Michigan

Ann Arbor

Detroit

Grand Rapids

Minnesota

Saint Paul

Minneapolis

Mississippi

Jackson

Missouri

Kansas City

St. Louis

Nebraska

Lincoln

Omaha

Nevada

Reno

Las Vegas

New Jersey

Princeton

New Mexico

Albuquerque

New York

Buffalo

Albany

White Plains

New York City

North Carolina

Charlotte

Durham

Raleigh

Ohio

Canton

Akron

Cincinnati

Cleveland

Columbus

Dayton

Oklahoma

Tulsa

Oklahoma City

Oregon

Portland

Pennsylvania

Pittsburgh

Philadelphia

Rhode Island

Providence

South Carolina

Columbia

Charleston

Spartanburg

Greenville

Tennessee

Memphis

Nashville

Knoxville

Texas

Dallas

El Paso

Houston

San Antonio

Austin

Utah

Salt Lake City

Virginia

Richmond

Alexandria

Arlington

Washington

Tacoma

Seattle

West Virginia

Charleston

Wisconsin

Madison

Milwaukee

Alberta

Edmonton

Calgary

British Columbia

Vancouver

Nova Scotia

Halifax

Ontario

Ottawa

Toronto

Quebec

Montreal

Puerto Rico

San Juan

© 2013-2019 Accelebrate, Inc. All Rights Reserved. All trademarks are owned by their respective owners.