Security in C# .NET Development
placeAmsterdam 8 apr. 2026 tot 10 apr. 2026Toon rooster event 8 april 2026, 09:30-16:30, Amsterdam, Dag 1 event 9 april 2026, 09:30-16:30, Amsterdam, Dag 2 event 10 april 2026, 09:30-16:30, Amsterdam, Dag 3 |
placeEindhoven 8 apr. 2026 tot 10 apr. 2026Toon rooster event 8 april 2026, 09:30-16:30, Eindhoven, Dag 1 event 9 april 2026, 09:30-16:30, Eindhoven, Dag 2 event 10 april 2026, 09:30-16:30, Eindhoven, Dag 3 |
placeHouten 8 apr. 2026 tot 10 apr. 2026Toon rooster event 8 april 2026, 09:30-16:30, Houten, Dag 1 event 9 april 2026, 09:30-16:30, Houten, Dag 2 event 10 april 2026, 09:30-16:30, Houten, Dag 3 |
placeRotterdam 8 apr. 2026 tot 10 apr. 2026Toon rooster event 8 april 2026, 09:30-16:30, Rotterdam, Dag 1 event 9 april 2026, 09:30-16:30, Rotterdam, Dag 2 event 10 april 2026, 09:30-16:30, Rotterdam, Dag 3 |
computer Online: Utrecht 8 apr. 2026 tot 10 apr. 2026Toon rooster event 8 april 2026, 09:30-16:30, Utrecht, Dag 1 event 9 april 2026, 09:30-16:30, Utrecht, Dag 2 event 10 april 2026, 09:30-16:30, Utrecht, Dag 3 |
placeZwolle 8 apr. 2026 tot 10 apr. 2026Toon rooster event 8 april 2026, 09:30-16:30, Zwolle, Dag 1 event 9 april 2026, 09:30-16:30, Zwolle, Dag 2 event 10 april 2026, 09:30-16:30, Zwolle, Dag 3 |
placeAmsterdam 10 jun. 2026 tot 12 jun. 2026Toon rooster event 10 juni 2026, 09:30-16:30, Amsterdam, Dag 1 event 11 juni 2026, 09:30-16:30, Amsterdam, Dag 2 event 12 juni 2026, 09:30-16:30, Amsterdam, Dag 3 |
placeEindhoven 10 jun. 2026 tot 12 jun. 2026Toon rooster event 10 juni 2026, 09:30-16:30, Eindhoven, Dag 1 event 11 juni 2026, 09:30-16:30, Eindhoven, Dag 2 event 12 juni 2026, 09:30-16:30, Eindhoven, Dag 3 |
placeHouten 10 jun. 2026 tot 12 jun. 2026Toon rooster event 10 juni 2026, 09:30-16:30, Houten, Dag 1 event 11 juni 2026, 09:30-16:30, Houten, Dag 2 event 12 juni 2026, 09:30-16:30, Houten, Dag 3 |
placeRotterdam 10 jun. 2026 tot 12 jun. 2026Toon rooster event 10 juni 2026, 09:30-16:30, Rotterdam, Dag 1 event 11 juni 2026, 09:30-16:30, Rotterdam, Dag 2 event 12 juni 2026, 09:30-16:30, Rotterdam, Dag 3 |
computer Online: Utrecht 10 jun. 2026 tot 12 jun. 2026Toon rooster event 10 juni 2026, 09:30-16:30, Utrecht, Dag 1 event 11 juni 2026, 09:30-16:30, Utrecht, Dag 2 event 12 juni 2026, 09:30-16:30, Utrecht, Dag 3 |
placeZwolle 10 jun. 2026 tot 12 jun. 2026Toon rooster event 10 juni 2026, 09:30-16:30, Zwolle, Dag 1 event 11 juni 2026, 09:30-16:30, Zwolle, Dag 2 event 12 juni 2026, 09:30-16:30, Zwolle, Dag 3 |
placeAmsterdam 12 aug. 2026 tot 14 aug. 2026Toon rooster event 12 augustus 2026, 09:30-16:30, Amsterdam, Dag 1 event 13 augustus 2026, 09:30-16:30, Amsterdam, Dag 2 event 14 augustus 2026, 09:30-16:30, Amsterdam, Dag 3 |
placeEindhoven 12 aug. 2026 tot 14 aug. 2026Toon rooster event 12 augustus 2026, 09:30-16:30, Eindhoven, Dag 1 event 13 augustus 2026, 09:30-16:30, Eindhoven, Dag 2 event 14 augustus 2026, 09:30-16:30, Eindhoven, Dag 3 |
placeHouten 12 aug. 2026 tot 14 aug. 2026Toon rooster event 12 augustus 2026, 09:30-16:30, Houten, Dag 1 event 13 augustus 2026, 09:30-16:30, Houten, Dag 2 event 14 augustus 2026, 09:30-16:30, Houten, Dag 3 |
placeRotterdam 12 aug. 2026 tot 14 aug. 2026Toon rooster event 12 augustus 2026, 09:30-16:30, Rotterdam, Dag 1 event 13 augustus 2026, 09:30-16:30, Rotterdam, Dag 2 event 14 augustus 2026, 09:30-16:30, Rotterdam, Dag 3 |
computer Online: Utrecht 12 aug. 2026 tot 14 aug. 2026Toon rooster event 12 augustus 2026, 09:30-16:30, Utrecht, Dag 1 event 13 augustus 2026, 09:30-16:30, Utrecht, Dag 2 event 14 augustus 2026, 09:30-16:30, Utrecht, Dag 3 |
placeZwolle 12 aug. 2026 tot 14 aug. 2026Toon rooster event 12 augustus 2026, 09:30-16:30, Zwolle, Dag 1 event 13 augustus 2026, 09:30-16:30, Zwolle, Dag 2 event 14 augustus 2026, 09:30-16:30, Zwolle, Dag 3 |
placeAmsterdam 14 okt. 2026 tot 16 okt. 2026Toon rooster event 14 oktober 2026, 09:30-16:30, Amsterdam, Dag 1 event 15 oktober 2026, 09:30-16:30, Amsterdam, Dag 2 event 16 oktober 2026, 09:30-16:30, Amsterdam, Dag 3 |
placeEindhoven 14 okt. 2026 tot 16 okt. 2026Toon rooster event 14 oktober 2026, 09:30-16:30, Eindhoven, Dag 1 event 15 oktober 2026, 09:30-16:30, Eindhoven, Dag 2 event 16 oktober 2026, 09:30-16:30, Eindhoven, Dag 3 |
Intro Secure Coding
The course Security in C# .NET Development starts with an overview of the application security landscape, including common attack vectors and potential risks when developing C# code.
Broken Access Control
The course proceed with a discussion of how to prevent vulnerabilities as a result of broken access control. Attention is paid to Role Based Access Control (RABC), the correct implementation of session management and Access Control Lists.
Cryptographic Failures
Cryptographic w…

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Intro Secure Coding
The course Security in C# .NET Development starts with an overview of the application security landscape, including common attack vectors and potential risks when developing C# code.
Broken Access Control
The course proceed with a discussion of how to prevent vulnerabilities as a result of broken access control. Attention is paid to Role Based Access Control (RABC), the correct implementation of session management and Access Control Lists.
Cryptographic Failures
Cryptographic weaknesses such as flawed encryption algorithms and incorrect use of cryptographic functions are also treated.
Injection Flaws
Then the dangers of injection are covered, such as SQL injection and cross-site scripting (XSS) and cross-site request forgery (CSRF). Secure coding practices to prevent injection are also explained, such as input validation, output encoding and parameterized queries.
Insecure Design
Insecure design is also on the program of the course Security in C# .NET Development with inadequate input validation, incorrect error handling and insecure authentication.
Misconfiguration Failures
Then it is highlighted how configuration errors can lead to security risks, such as the use of default settings and insufficient protection of sensitive data.
NuGet Packages
And attention is paid to the risks of external NuGet packages, how to assess NuGet packages and best practices for safely integrating NuGet packages.
Logging and Monitoring
Finally it is discussed how logging and monitoring can improve the security of C# applications. Attention is paid to the importance of logging and monitoring for detecting and responding to security incidents.
Audience Course Security in C# .NET Development
The course Security in C# .NET Development is intended for C# Developers who want to learn how to protect C# applications against the many security risks.
Prerequisites Course Security in C# .NET Development
To participate in this course, knowledge of and experience with C# and the .NET Platform is required.
Realization Training Security in C# .NET Development
The course Security in C# .NET Development is a hands-on course. Theory explanation based on demos and presentations is interchanged with practice based on exercises.
Certificate course Security in C# .NET Development
After successfully completing the training, attendants will receive a certificate of participation in the course Security in C# .NET Development.
Modules
Module 1 : Intro Secure Coding
- Secure Coding practices
- Never trusting Input
- SQL injection and NoSQL injection
- OS command injection
- Session Fixation
- Cross Site Scripting and CSRF
- Sensitive Data Exposure
- Insecure Deserialization
- Security Misconfiguration
- Using Unsafe Components
Module 2 : Broken Access Control
- Implement Proper Authentication
- Broken Authentication
- Role Based Access Control (RBAC)
- Implement Use Session Management
- Session Timeout
- Access Control Lists (ACLs)
- Principle of Least Privilege (PoLP)
- URL and API Authorization
- Error Handling
- Regular Security Testing
Module 3 : Cryptographic Failures
- Sensitive Data Exposure
- Weak Key Generation
- Insecure Storage of Keys
- Using Outdated Algorithms
- Hardcoding Secrets
- Insufficient Key Management
- Avoid Homegrown Cryptography
- Verify Signatures
- Side-Channel Attacks
- Lack of Forward Secrecy
Module 4 : Injection Flaws
- SQL Injection (SQLi)
- Cross-Site Scripting (XSS)
- Command Injection
- XML Injection
- LDAP Injection
- XPath Injection
- SSI Injection
- Object Injection
- Template Injection
- CRLF Injection
Module 5 : Insecure Design
- Inadequate Authentication
- Inadequate Authorization
- Lack of Input Validation
- Excessive Data Exposure
- Insecure Session Management
- Hardcoding Secrets
- Insufficient Logging and Monitoring
- Insecure Data Storage
- Cross-Site Request Forgery
- Improper Error Handling
Module 6 : Misconfiguration Failures
- Improper Access Control
- Unsecured APIs
- Open Database Ports
- Default Credentials
- Unused or Unnecessary Features
- Weak Password Policies
- Missing Security Updates
- Improper File Permissions
- Insecure Session Management
- Excessive Error Detail
Module 7 : NuGet Packages
- Known Vulnerabilities
- Malicious Packages
- License Compliance
- Misconfigured Packages
- Dependency Chains
- Cryptographic Weaknesses
- Data Privacy and Compliance
- Resource Exhaustion
- Insecure Configuration Defaults
Module 8 : Authentication Mistakes
- Weak Password Policies
- No Account Lockout Mechanism
- Inadequate Password Storage
- Hardcoding Credentials
- Lack of Multi-Factor Authentication (MFA)
- Insufficient Session Management
- Missing CAPTCHA or Rate Limiting
- Overly Permissive Access Controls
- Improper Handling Forgotten Passwords
Module 9 : Logging and Monitoring
- Insufficient Logging
- Lack of Centralized Logging
- Logging Sensitive Information
- Inadequate Log Retention
- Unencrypted Logging
- Insufficient Access Controls
- Failure to Monitor Logs in Real-Time
- No Alerts or Notifications
- Ignoring Anomalous Activity
Waarom SpiralTrain
SpiralTrain is specialist op het gebied van software development trainingen. Wie bieden zowel trainingen aan voor beginnende programmeurs die zich de basis van talen en tools eigen willen maken als ook trainingen voor ervaren software professionals die zich willen bekwamen in de nieuwste versie van een taal of een framework.
Onze trainingkenmerken zich door :
• Klassikale of online open roostertrainingen en andere
trainingsvormen
• Eenduidige en scherpe cursusprijzen, zonder extra kosten
• Veel trainingen met een doorlopende case study
• Trainingen die gericht zijn op certificering
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

