Course Provider
What will you learn in this course?
This course prepares the graduate student to employ the theoretical and conceptual underpinnings to understand the methods in application hardening and its relevant techniques to configuration deployment along with center for internet security (CIS) controls.
The academic engagement will cover the following topics:
- Identify a secure baseline
- Customize
- Deploy
Students will be able to perform system hardening techniques with CIS controls.
Application Hardening :-
Inhibits hackers’ efforts to reverse engineer an app back to source code Thwarts hackers’ efforts to inspect internal values, monitor, or tamper with an app Helps.
Application Security – Hardening and Deployment configuration
-
Skill Type
Emerging Tech
- Domain
Cybersecurity
- Course Category
Deepskilling Course
- Certificate Earned Joint Co-Branded Participation Certificate
- Nasscom Assessment Available
- Course Covered under GoI Incentive
Yes
-
- Course Price
INR 5,000
- Course Duration
49.5 Hours
- Course Price
Why should you take this course?
- Provides best practices for securely deploying applications.
- Protect the application from a hacker trying to reverse engineer the app back to source code.
- Prevent hackers from trying to inspect internal values, monitor or tamper with the app.
- Enable your application to safely run in zero‑trust environments.
- Protect your users’ data and sensitive information.
- Helps protect the confidentiality, integrity, and availability of your application in production.
- Identifies when each task should be performed: at or near the beginning of development, on an ongoing basis, or just before deployment.
- Helps avoid expensive rework late in your development process.
Who should take this course?
- Working Professional with Experience
- Entry Level Working Professional
- Graduate student
- IT application specialist
- IT Application Architect
Curriculum
- Binary level code obfuscation to prevent attackers from seeing a functional view of an application.
- Application integrity checks ensure the application code has not been altered.
- Detect whether the app is running on a rooted or jailbroken device.
- Vary how protections are applied in each build to prevent attackers from building up a cumulative understanding of how apps are being protected.
- Determine what actions to take if app is being attacked or a device is determined to be compromised.
- Utilize white-box cryptographic protection to encrypt critical keys and data.
Tools you will learn in this course
- Arachni
- Metasploit OWASP
- Nmap, Nagios
- Pfsense
- Snort
- Kali Linux
- Skipfish
- OpenVAS
- Cryts
- Oracle Traffic Director
- Blackfire
- Tideways
- Splunk
- Loggly
- PaperTrail
- Netsparker
- Fireeye
- Open SSH
- PCI requirement
- SolarWinds Patch manager
- Manageengine
- WSUS RSI Security
- App Knox
- Veracode
- Netsparker