Your privacy matters: This site uses cookies to analyze site usage and provide social media features. Learn More.

Secure Coding for Banking and Finance

SEC-120 (5 Days)

Request Pricing

Secure Coding Training Overview

Accelebrate's Secure Coding for Banking and Finance training teaches engineers in these sectors how to prevent vulnerabilities by applying best practices for writing secure code.

Location and Pricing

Most Accelebrate courses are delivered as private, customized, on-site training at our clients' locations worldwide for groups of 3 or more attendees and are custom tailored to their specific needs. Please visit our client list to see organizations for whom we have delivered private in-house training. These courses can also be delivered as live, private online classes for groups that are geographically dispersed or wish to save on the instructor's or students' travel expenses. To receive a customized proposal and price quote for private training at your site or online, please contact us.

Secure Coding Training Objectives

All students will:

  • Understand basic concepts of security, IT security and secure coding
  • Understand special threats in the banking and finance sector
  • Understand regulations and standards
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn about XML security
  • Learn client-side vulnerabilities and secure coding practices
  • Have a practical understanding of cryptography
  • Understand the requirements of secure communication
  • Understand essential security protocols
  • Understand some recent attacks against cryptosystems
  • Understand security concepts of Web services
  • Learn about JSON security
  • Learn about typical coding mistakes and how to avoid them
  • Get information about some recent vulnerabilities in the Java framework
  • Learn about denial of service attacks and protections
  • Get practical knowledge in using security testing techniques and tools
  • Get sources and further readings on secure coding practice

Secure Coding Training Outline

Expand All | Collapse All | Printer-Friendly

Introduction
IT Security and Secure Coding
  • Nature of security
  • What is risk?
  • IT security vs. secure coding
  • From vulnerabilities to botnets and cybercrime
Classification of Security Flaws
  • Landwehr’s taxonomy
  • The Seven Pernicious Kingdoms
  • OWASP Top Ten 2017
  • CWE/SANS top 25 most dangerous software errors
  • SEI CERT secure coding standards
Special Threats in the Banking and Finance Sector
  • Banking and finance threats – trends
  • Banking and finance threats – some numbers
  • Attacker profiles
  • Most significant targets
  • Industry and regulatory response to threats
  • Attacker tools and vectors
Regulations and Standards
  • The fintech cybersecurity regulatory / compliance landscape
  • Important organizations and regulations from an IT standpoint
  • Managing sensitive data
  • Breach disclosure obligations
  • PCI DSS compliance
Web Application Security (OWASP Top Ten 2017)
  • A1 - Injection
  • A2 - Broken authentication
  • A3 - Sensitive data exposure
  • A4 - XML external entity (XXE)
  • A5 - Broken access control
  • A6 - Security misconfiguration
  • A7 - Cross-Site Scripting (XSS)
  • A8 - Insecure deserialization
  • A9 - Using components with known vulnerabilities
  • A10 - Insufficient logging and monitoring
Client-side Security
  • JavaScript security
  • Same Origin Policy
  • Cross-Origin Resource Sharing (CORS)
  • Clickjacking
AJAX Security
  • XSS in AJAX
  • Script injection attack in AJAX
  • Exercise – XSS in AJAX
  • XSS protection in Ajax
  • Exercise CSRF in AJAX – JavaScript hijacking
  • CSRF protection in AJAX
HTML5 Security
  • New XSS possibilities in HTML5
  • HTML5 clickjacking attack – text field injection
  • HTML5 clickjacking – content extraction
  • Form tampering
  • Exercise – Form tampering
  • Cross-origin requests
  • HTML proxy with cross-origin request
Security Architecture
  • (platform and technology dependent topics)
  • Application level access control
  • User level access control
  • Requirements for Secure Communication
  • Secure Acknowledgment
  • Malicious message absorption
  • Inadvertent message loss
Integrity
  • Error detection - Inadvertent message distortion (noise)
  • Authenticity - Malicious message manipulation
  • Non-repudiation
Confidentiality
  • Model of encrypted communication
  • Encryption methods in practice
  • Strength of encryption algorithms
Remote Identification
  • Requirements for remote identification
  • Anonymity and Traffic Analysis
  • Model of anonymous communication
  • Traffic analysis
  • Theoretically strong protection against traffic analysis
  • Practical protection against traffic analysis
Practical Cryptography
  • Cryptosystems
  • Symmetric-key cryptography
  • Other cryptographic algorithms
  • Asymmetric (public-key) cryptography
  • Crypto Libraries and APIs
Security Protocols
  • SSL/TLS Protocols
  • Security services
  • SSL/TLS handshake
  • Protocol-Level Vulnerabilities
  • Padding Oracle Attacks
Input Validation
  • Input validation concepts
  • Integer problems
  • Path traversal vulnerability
  • Unvalidated redirects and forwards
  • Log forging
Security of Web Services
  • Securing web services – two general approaches
  • SOAP - Simple Object Access Protocol
  • Security of RESTful web services
XML Security
  • Introduction
  • XML parsing
  • XML injection
JSON Security
  • JSON parsing
  • Embedding JSON server-side
  • JSON injection
  • JSON hijacking
  • Case study – XSS via spoofed JSON element
Improper Use of Security Features
  • Typical problems related to the use of security features
  • Unsecure randomness
  • Password management
  • Object-relational mapping (ORM) security
  • Improper Error and Exception Handling
  • Time and State Problems
  • Code Quality Problems
Denial of Service
  • DoS introduction
  • Asymmetric DoS
  • SSL/TLS renegotiation DoS
  • Case study – ReDos in Stack Exchange
  • Hashtable collision attack
Security Testing Techniques and Tools
  • General testing approaches
  • Source code review
  • Testing the implementation
Principles of Security and Secure Coding
  • Matt Bishop’s principles of robust programming
  • The security principles of Saltzer and Schroeder
  • SEI Cert top 10 secure coding practices
Knowledge Sources
  • Secure coding sources – a starter kit
  • Vulnerability databases
Conclusion
Request Pricing
Lecture percentage

50%

Lecture/Demo

Lab percentage

50%

Lab

Course Number:

SEC-120

Duration:

5 Days

Prerequisites:

All secure coding training students should have advanced desktop and Web application development experience.

Training Materials:

All attendees receive comprehensive courseware.

Software Requirements:

A VirtualBox virtual machine with all required software will be provided.

Contact Us:

Accelebrate’s training classes are available for private groups of 3 or more people at your site or online anywhere worldwide.

Don't settle for a "one size fits all" public class! Have Accelebrate deliver exactly the training you want, privately at your site or online, for less than the cost of a public class.

For pricing and to learn more, please contact us.

Contact Us

Toll-free in US/Canada:
877 849 1850
International:
+1 678 648 3113

Toll-free in US/Canada:
866 566 1228
International:
+1 404 420 2491

925B Peachtree Street, NE
PMB 378
Atlanta, GA 30309-3918
USA

Subscribe to our Newsletter:

Never miss the latest news and information from Accelebrate:

Microsoft Gold Partner

Please see our complete list of
Microsoft Official Courses

Recent Training Locations

Alabama

Huntsville

Montgomery

Birmingham

Alaska

Anchorage

Arizona

Phoenix

Tucson

Arkansas

Fayetteville

Little Rock

California

San Francisco

Oakland

San Jose

Orange County

Los Angeles

Sacramento

San Diego

Colorado

Denver

Boulder

Colorado Springs

Connecticut

Hartford

DC

Washington

Florida

Fort Lauderdale

Miami

Jacksonville

Orlando

Saint Petersburg

Tampa

Georgia

Atlanta

Augusta

Savannah

Idaho

Boise

Illinois

Chicago

Indiana

Indianapolis

Iowa

Ceder Rapids

Des Moines

Kansas

Wichita

Kentucky

Lexington

Louisville

Louisiana

Banton Rouge

New Orleans

Maine

Portland

Maryland

Annapolis

Baltimore

Hagerstown

Frederick

Massachusetts

Springfield

Boston

Cambridge

Michigan

Ann Arbor

Detroit

Grand Rapids

Minnesota

Saint Paul

Minneapolis

Mississippi

Jackson

Missouri

Kansas City

St. Louis

Nebraska

Lincoln

Omaha

Nevada

Reno

Las Vegas

New Jersey

Princeton

New Mexico

Albuquerque

New York

Buffalo

Albany

White Plains

New York City

North Carolina

Charlotte

Durham

Raleigh

Ohio

Canton

Akron

Cincinnati

Cleveland

Columbus

Dayton

Oklahoma

Tulsa

Oklahoma City

Oregon

Portland

Pennsylvania

Pittsburgh

Philadelphia

Rhode Island

Providence

South Carolina

Columbia

Charleston

Spartanburg

Greenville

Tennessee

Memphis

Nashville

Knoxville

Texas

Dallas

El Paso

Houston

San Antonio

Austin

Utah

Salt Lake City

Virginia

Richmond

Alexandria

Arlington

Washington

Tacoma

Seattle

West Virginia

Charleston

Wisconsin

Madison

Milwaukee

Alberta

Edmonton

Calgary

British Columbia

Vancouver

Nova Scotia

Halifax

Ontario

Ottawa

Toronto

Quebec

Montreal

Puerto Rico

San Juan

© 2013-2019 Accelebrate, Inc. All Rights Reserved. All trademarks are owned by their respective owners.