Secure Coding for Healthcare

SEC-136 (3 Days)

Request Pricing

Healthcare Secure Coding Training Overview

In the healthcare sector, application security is crucial, as exploited vulnerabilities can result in severe medical, operational, legal, and regulatory consequences. In order to remain a trusted provider, your systems and applications need to comply with the Health Information Portability and Accountability Act (HIPAA) requirements.

This Secure Coding For Healthcare training teaches application and network developers how to write their code in a maximally secure way.

 

Location and Pricing

Most Accelebrate courses are delivered as private, customized, on-site training at our clients' locations worldwide for groups of 3 or more attendees and are custom tailored to their specific needs. Please visit our client list to see organizations for whom we have delivered private in-house training. These courses can also be delivered as live, private online classes for groups that are geographically dispersed or wish to save on the instructor's or students' travel expenses. To receive a customized proposal and price quote for private training at your site or online, please contact us.

Healthcare Secure Coding Training Objectives

All students will:

  • Explore basic concepts of security, IT security, and secure coding
  • Understand special threats in the healthcare sector
  • Follow regulations and standards
  • Learn Web vulnerabilities beyond the OWASP Top Ten and how to avoid them
  • Study XML and JSON security
  • Learn client-side vulnerabilities and secure coding practices
  • Learn about JSON security
  • Discover how to thwart denial of service attacks
  • Gain a practical understanding of cryptography
  • Understand essential security protocols

Healthcare Secure Coding Training Outline

Expand All | Collapse All | Printer-Friendly

Introduction
IT security and secure coding
  • Nature of security
  • What is risk?
  • IT security vs. secure coding
  • From vulnerabilities to botnets and cybercrime
    • Nature of security flaws
    • Reasons of difficulty
    • From an infected computer to targeted attacks
  • Classification of security flaws
    • Landwehr’s taxonomy
    • The Seven Pernicious Kingdoms
    • OWASP Top Ten 2017
Special Threats in the Healthcare Sector
  • Threats in healthcare – trends and numbers
  • Attacker model
  • Most significant targets
  • Industry and regulatory response to threats
  • How is cybersecurity different for medical devices?
  • Attacker tools and vectors
Regulations and Standards
  • HIPAA
    • What is HIPAA?
    • Amendments
    • Who needs to be regulated by HIPAA?
    • General safety requirements
    • Implementation requirements
Web Application Security (OWASP Top Ten 2017)
  • Injection
    • Injection principles
    • SQL injection
    • Other injection flaws
  • Broken authentication
    • Session handling threats
    • Session handling best practices
    • Setting cookie attributes – best practices
    • Cross-site request forgery (CSRF)
  • Sensitive data exposure
    • Sensitive data exposure
    • Transport layer security
  • XML external entity (XXE)
    • XML Entity introduction
    • XML external entity attack (XXE) – resource inclusion
    • XML external entity attack – URL invocation
    • XML external entity attack – parameter entities
    • Case study – XXE in Google Toolbar
  • Broken access control
    • Typical access control weaknesses
    • Insecure direct object reference (IDOR)
    • Protection against IDOR
    • Case study – Molina Healthcare
    • Case study – Facebook Notes
  • Security misconfiguration
    • Configuring the environment
    • Insecure file uploads
    • Filtering file uploads – validation and configuration
  • Cross-Site Scripting (XSS)
    • Persistent XSS
    • Reflected XSS
    • DOM-based XSS
    • XSS prevention
  • Insecure deserialization
    • Deserialization basics
    • Security challenges of deserialization
    • Issues with deserialization – JSON
  • Using components with known vulnerabilities
    • Vulnerability attributes
    • Common Vulnerability Scoring System – CVSS
  • Insufficient logging and monitoring
    • Detection and response
    • Logging and log analysis
Client-side Security
  • JavaScript security
  • Same Origin Policy
  • Simple requests
  • Preflight requests
  • JavaScript usage
  • JavaScript Global Object
  • Dangers of JavaScript
  • Client-side authentication and password management
  • Protecting JavaScript code
  • Clickjacking
    • Clickjacking
    • Protection against Clickjacking
    • Anti-frame-busting – dismissing protection scripts
    • Protection against busting frame busting
  • AJAX security
    • XSS in AJAX
    • Script injection attack in AJAX
    • XSS protection in AJAX
    • CSRF protection in AJAX
    • MySpace worm
    • AJAX security guidelines
  • HTML5 security
    • New XSS possibilities in HTML5
    • Client-side persistent data storage
    • HTML5 clickjacking attack – text field injection
    • HTML5 clickjacking – content extraction
    • Form tampering
    • Cross-origin requests
    • HTML proxy with cross-origin request
XML Security
  • Introduction
  • XML parsing
  • XML injection
    • (Ab)using CDATA to store XSS payload in XML
    • Protection through sanitization and XML validation
    • XML bomb
JSON Security
  • Embedding JSON server-side
  • JSON injection
  • JSON hijacking
  • Case study – XSS via spoofed JSON element
Denial of Service
  • DoS introduction
  • Asymmetric DoS
  • Case study – Denial-of-service against ICDs
    • Denial-of-service: battery drain
    • Denial-of-service: RF crash
  • Case study – ReDos in Stack Exchange
  • Hashtable collision attack
    • Using hashtables to store data
    • Hashtable collision
Practical Cryptography
  • Rule #1 of implementing cryptography
  • Cryptosystems
    • Elements of a cryptosystem
  • Symmetric-key cryptography
    • Providing confidentiality with symmetric cryptography
    • Symmetric encryption algorithms
    • Modes of operation
  • Other cryptographic algorithms
    • Hash or message digest
    • Hash algorithms
    • SHAttered
    • Message Authentication Code (MAC)
    • Providing integrity and authenticity with a symmetric key
    • Random numbers and cryptography
    • Cryptographically-strong PRNGs
    • Hardware-based TRNGs
  • Asymmetric (public-key) cryptography
    • Providing confidentiality with public-key encryption
    • Rule of thumb – possession of private key
    • The RSA algorithm
  • Public Key Infrastructure (PKI)
    • Man-in-the-Middle (MitM) attack
    • Digital certificates against MitM attack
    • Certificate Authorities in Public Key Infrastructure
    • X.509 digital certificate
Security Protocols
  • Secure network protocols
  • Specific vs. general solutions
  • SSL/TLS protocols
    • Security services
    • SSL/TLS handshake
  • Improper use of security features
    • Typical problems related to the use of security features
    • Insecure randomness
    • Password management
  • Input validation
    • Input validation concepts
    • Integer problems
    • Path traversal vulnerability
    • Unvalidated redirects and forwards
    • Log forging
Principles of Security and Secure Coding
  • Matt Bishop’s principles of robust programming
  • The security principles of Saltzer and Schroeder
Knowledge Sources
  • Secure coding sources – a starter kit
  • Vulnerability databases
  • Healthcare cybersecurity resources
Conclusion
Request Pricing

Lecture percentage

50%

Lecture/Demo

Lab percentage

50%

Lab

Course Number:

SEC-136

Duration:

3 Days

Prerequisites:

All students must have general desktop and Web application development experience.

Training Materials:

All Healthcare Secure Coding training attendees receive comprehensive courseware.

Software Requirements:

Accelebrate can either provide a VMware virtual machine that can be run locally for the training or can provide access to a preconfigured cloud environment for each participant. Please contact us for details.

Contact Us:

Accelebrate’s training classes are available for private groups of 3 or more people at your site or online anywhere worldwide.

Don't settle for a "one size fits all" public class! Have Accelebrate deliver exactly the training you want, privately at your site or online, for less than the cost of a public class.

For pricing and to learn more, please contact us.

Contact Us Train For Us

Toll-free in US/Canada:
877 849 1850
International:
+1 678 648 3113

Toll-free in US/Canada:
866 566 1228
International:
+1 404 420 2491

925B Peachtree Street, NE
PMB 378
Atlanta, GA 30309-3918
USA

Subscribe to our Newsletter:

Never miss the latest news and information from Accelebrate:

Microsoft Gold Partner

Please see our complete list of
Microsoft Official Courses

Recent Training Locations

Alabama

Huntsville

Montgomery

Birmingham

Alaska

Anchorage

Arizona

Phoenix

Tucson

Arkansas

Fayetteville

Little Rock

California

San Francisco

Oakland

San Jose

Orange County

Los Angeles

Sacramento

San Diego

Colorado

Denver

Boulder

Colorado Springs

Connecticut

Hartford

DC

Washington

Florida

Fort Lauderdale

Miami

Jacksonville

Orlando

Saint Petersburg

Tampa

Georgia

Atlanta

Augusta

Savannah

Idaho

Boise

Illinois

Chicago

Indiana

Indianapolis

Iowa

Ceder Rapids

Des Moines

Kansas

Wichita

Kentucky

Lexington

Louisville

Louisiana

Banton Rouge

New Orleans

Maine

Portland

Maryland

Annapolis

Baltimore

Hagerstown

Frederick

Massachusetts

Springfield

Boston

Cambridge

Michigan

Ann Arbor

Detroit

Grand Rapids

Minnesota

Saint Paul

Minneapolis

Mississippi

Jackson

Missouri

Kansas City

St. Louis

Nebraska

Lincoln

Omaha

Nevada

Reno

Las Vegas

New Jersey

Princeton

New Mexico

Albuquerque

New York

Buffalo

Albany

White Plains

New York City

North Carolina

Charlotte

Durham

Raleigh

Ohio

Canton

Akron

Cincinnati

Cleveland

Columbus

Dayton

Oklahoma

Tulsa

Oklahoma City

Oregon

Portland

Pennsylvania

Pittsburgh

Philadelphia

Rhode Island

Providence

South Carolina

Columbia

Charleston

Spartanburg

Greenville

Tennessee

Memphis

Nashville

Knoxville

Texas

Dallas

El Paso

Houston

San Antonio

Austin

Utah

Salt Lake City

Virginia

Richmond

Alexandria

Arlington

Washington

Tacoma

Seattle

West Virginia

Charleston

Wisconsin

Madison

Milwaukee

Alberta

Edmonton

Calgary

British Columbia

Vancouver

Nova Scotia

Halifax

Ontario

Ottawa

Toronto

Quebec

Montreal

Puerto Rico

San Juan

© 2013-2019 Accelebrate, Inc. All Rights Reserved. All trademarks are owned by their respective owners.