NP URI: www.nobleprog.com.ec/en/cc/cl-ans Undefined array key "mysql_identifier_quote_character" /apps/nobleprog-website/includes/functions/new-modules-general-functions.php:82 Array ( [0] => Array ( [file] => /apps/nobleprog-website/includes/functions/new-modules-general-functions.php [line] => 82 [function] => myErrorHandler [args] => Array ( [0] => 2 [1] => Undefined array key "mysql_identifier_quote_character" [2] => /apps/nobleprog-website/includes/functions/new-modules-general-functions.php [3] => 82 ) ) [1] => Array ( [file] => /apps/hitra7/drupal7/includes/database/mysql/database.inc [line] => 397 [function] => variable_get [args] => Array ( [0] => mysql_identifier_quote_character [1] => ` ) ) [2] => Array ( [file] => /apps/hitra7/drupal7/includes/database/database.inc [line] => 329 [function] => setPrefix [class] => DatabaseConnection_mysql [object] => DatabaseConnection_mysql Object ( [target:protected] => [key:protected] => [logger:protected] => [transactionLayers:protected] => Array ( ) [driverClasses:protected] => Array ( ) [statementClass:protected] => DatabaseStatementBase [transactionSupport:protected] => 1 [transactionalDDLSupport:protected] => [temporaryNameIndex:protected] => 0 [connection:protected] => [connectionOptions:protected] => Array ( [driver] => mysql [database] => hitrahr [username] => root [password] => asdf [host] => localhost [prefix] => Array ( [default] => ) ) [schema:protected] => [prefixes:protected] => Array ( [default] => ) [prefixSearch:protected] => Array ( [0] => { [1] => } ) [prefixReplace:protected] => Array ( [0] => [1] => ) [escapedNames:protected] => Array ( ) [escapedAliases:protected] => Array ( ) [unprefixedTablesMap:protected] => Array ( ) [needsCleanup:protected] => [reservedKeyWords:DatabaseConnection_mysql:private] => Array ( [0] => accessible [1] => add [2] => admin [3] => all [4] => alter [5] => analyze [6] => and [7] => as [8] => asc [9] => asensitive [10] => before [11] => between [12] => bigint [13] => binary [14] => blob [15] => both [16] => by [17] => call [18] => cascade [19] => case [20] => change [21] => char [22] => character [23] => check [24] => collate [25] => column [26] => condition [27] => constraint [28] => continue [29] => convert [30] => create [31] => cross [32] => cube [33] => cume_dist [34] => current_date [35] => current_time [36] => current_timestamp [37] => current_user [38] => cursor [39] => database [40] => databases [41] => day_hour [42] => day_microsecond [43] => day_minute [44] => day_second [45] => dec [46] => decimal [47] => declare [48] => default [49] => delayed [50] => delete [51] => dense_rank [52] => desc [53] => describe [54] => deterministic [55] => distinct [56] => distinctrow [57] => div [58] => double [59] => drop [60] => dual [61] => each [62] => else [63] => elseif [64] => empty [65] => enclosed [66] => escaped [67] => except [68] => exists [69] => exit [70] => explain [71] => false [72] => fetch [73] => first_value [74] => float [75] => float4 [76] => float8 [77] => for [78] => force [79] => foreign [80] => from [81] => fulltext [82] => function [83] => generated [84] => get [85] => grant [86] => group [87] => grouping [88] => groups [89] => having [90] => high_priority [91] => hour_microsecond [92] => hour_minute [93] => hour_second [94] => if [95] => ignore [96] => in [97] => index [98] => infile [99] => inner [100] => inout [101] => insensitive [102] => insert [103] => int [104] => int1 [105] => int2 [106] => int3 [107] => int4 [108] => int8 [109] => integer [110] => intersect [111] => interval [112] => into [113] => io_after_gtids [114] => io_before_gtids [115] => is [116] => iterate [117] => join [118] => json_table [119] => key [120] => keys [121] => kill [122] => lag [123] => last_value [124] => lateral [125] => lead [126] => leading [127] => leave [128] => left [129] => like [130] => limit [131] => linear [132] => lines [133] => load [134] => localtime [135] => localtimestamp [136] => lock [137] => long [138] => longblob [139] => longtext [140] => loop [141] => low_priority [142] => master_bind [143] => master_ssl_verify_server_cert [144] => match [145] => maxvalue [146] => mediumblob [147] => mediumint [148] => mediumtext [149] => middleint [150] => minute_microsecond [151] => minute_second [152] => mod [153] => modifies [154] => natural [155] => not [156] => no_write_to_binlog [157] => nth_value [158] => ntile [159] => null [160] => numeric [161] => of [162] => on [163] => optimize [164] => optimizer_costs [165] => option [166] => optionally [167] => or [168] => order [169] => out [170] => outer [171] => outfile [172] => over [173] => partition [174] => percent_rank [175] => persist [176] => persist_only [177] => precision [178] => primary [179] => procedure [180] => purge [181] => range [182] => rank [183] => read [184] => reads [185] => read_write [186] => real [187] => recursive [188] => references [189] => regexp [190] => release [191] => rename [192] => repeat [193] => replace [194] => require [195] => resignal [196] => restrict [197] => return [198] => revoke [199] => right [200] => rlike [201] => row [202] => rows [203] => row_number [204] => schema [205] => schemas [206] => second_microsecond [207] => select [208] => sensitive [209] => separator [210] => set [211] => show [212] => signal [213] => smallint [214] => spatial [215] => specific [216] => sql [217] => sqlexception [218] => sqlstate [219] => sqlwarning [220] => sql_big_result [221] => sql_calc_found_rows [222] => sql_small_result [223] => ssl [224] => starting [225] => stored [226] => straight_join [227] => system [228] => table [229] => terminated [230] => then [231] => tinyblob [232] => tinyint [233] => tinytext [234] => to [235] => trailing [236] => trigger [237] => true [238] => undo [239] => union [240] => unique [241] => unlock [242] => unsigned [243] => update [244] => usage [245] => use [246] => using [247] => utc_date [248] => utc_time [249] => utc_timestamp [250] => values [251] => varbinary [252] => varchar [253] => varcharacter [254] => varying [255] => virtual [256] => when [257] => where [258] => while [259] => window [260] => with [261] => write [262] => xor [263] => year_month [264] => zerofill ) ) [type] => -> [args] => Array ( [0] => Array ( [default] => ) ) ) [3] => Array ( [file] => /apps/hitra7/drupal7/includes/database/mysql/database.inc [line] => 349 [function] => __construct [class] => DatabaseConnection [object] => DatabaseConnection_mysql Object ( [target:protected] => [key:protected] => [logger:protected] => [transactionLayers:protected] => Array ( ) [driverClasses:protected] => Array ( ) [statementClass:protected] => DatabaseStatementBase [transactionSupport:protected] => 1 [transactionalDDLSupport:protected] => [temporaryNameIndex:protected] => 0 [connection:protected] => [connectionOptions:protected] => Array ( [driver] => mysql [database] => hitrahr [username] => root [password] => asdf [host] => localhost [prefix] => Array ( [default] => ) ) [schema:protected] => [prefixes:protected] => Array ( [default] => ) [prefixSearch:protected] => Array ( [0] => { [1] => } ) [prefixReplace:protected] => Array ( [0] => [1] => ) [escapedNames:protected] => Array ( ) [escapedAliases:protected] => Array ( ) [unprefixedTablesMap:protected] => Array ( ) [needsCleanup:protected] => [reservedKeyWords:DatabaseConnection_mysql:private] => Array ( [0] => accessible [1] => add [2] => admin [3] => all [4] => alter [5] => analyze [6] => and [7] => as [8] => asc [9] => asensitive [10] => before [11] => between [12] => bigint [13] => binary [14] => blob [15] => both [16] => by [17] => call [18] => cascade [19] => case [20] => change [21] => char [22] => character [23] => check [24] => collate [25] => column [26] => condition [27] => constraint [28] => continue [29] => convert [30] => create [31] => cross [32] => cube [33] => cume_dist [34] => current_date [35] => current_time [36] => current_timestamp [37] => current_user [38] => cursor [39] => database [40] => databases [41] => day_hour [42] => day_microsecond [43] => day_minute [44] => day_second [45] => dec [46] => decimal [47] => declare [48] => default [49] => delayed [50] => delete [51] => dense_rank [52] => desc [53] => describe [54] => deterministic [55] => distinct [56] => distinctrow [57] => div [58] => double [59] => drop [60] => dual [61] => each [62] => else [63] => elseif [64] => empty [65] => enclosed [66] => escaped [67] => except [68] => exists [69] => exit [70] => explain [71] => false [72] => fetch [73] => first_value [74] => float [75] => float4 [76] => float8 [77] => for [78] => force [79] => foreign [80] => from [81] => fulltext [82] => function [83] => generated [84] => get [85] => grant [86] => group [87] => grouping [88] => groups [89] => having [90] => high_priority [91] => hour_microsecond [92] => hour_minute [93] => hour_second [94] => if [95] => ignore [96] => in [97] => index [98] => infile [99] => inner [100] => inout [101] => insensitive [102] => insert [103] => int [104] => int1 [105] => int2 [106] => int3 [107] => int4 [108] => int8 [109] => integer [110] => intersect [111] => interval [112] => into [113] => io_after_gtids [114] => io_before_gtids [115] => is [116] => iterate [117] => join [118] => json_table [119] => key [120] => keys [121] => kill [122] => lag [123] => last_value [124] => lateral [125] => lead [126] => leading [127] => leave [128] => left [129] => like [130] => limit [131] => linear [132] => lines [133] => load [134] => localtime [135] => localtimestamp [136] => lock [137] => long [138] => longblob [139] => longtext [140] => loop [141] => low_priority [142] => master_bind [143] => master_ssl_verify_server_cert [144] => match [145] => maxvalue [146] => mediumblob [147] => mediumint [148] => mediumtext [149] => middleint [150] => minute_microsecond [151] => minute_second [152] => mod [153] => modifies [154] => natural [155] => not [156] => no_write_to_binlog [157] => nth_value [158] => ntile [159] => null [160] => numeric [161] => of [162] => on [163] => optimize [164] => optimizer_costs [165] => option [166] => optionally [167] => or [168] => order [169] => out [170] => outer [171] => outfile [172] => over [173] => partition [174] => percent_rank [175] => persist [176] => persist_only [177] => precision [178] => primary [179] => procedure [180] => purge [181] => range [182] => rank [183] => read [184] => reads [185] => read_write [186] => real [187] => recursive [188] => references [189] => regexp [190] => release [191] => rename [192] => repeat [193] => replace [194] => require [195] => resignal [196] => restrict [197] => return [198] => revoke [199] => right [200] => rlike [201] => row [202] => rows [203] => row_number [204] => schema [205] => schemas [206] => second_microsecond [207] => select [208] => sensitive [209] => separator [210] => set [211] => show [212] => signal [213] => smallint [214] => spatial [215] => specific [216] => sql [217] => sqlexception [218] => sqlstate [219] => sqlwarning [220] => sql_big_result [221] => sql_calc_found_rows [222] => sql_small_result [223] => ssl [224] => starting [225] => stored [226] => straight_join [227] => system [228] => table [229] => terminated [230] => then [231] => tinyblob [232] => tinyint [233] => tinytext [234] => to [235] => trailing [236] => trigger [237] => true [238] => undo [239] => union [240] => unique [241] => unlock [242] => unsigned [243] => update [244] => usage [245] => use [246] => using [247] => utc_date [248] => utc_time [249] => utc_timestamp [250] => values [251] => varbinary [252] => varchar [253] => varcharacter [254] => varying [255] => virtual [256] => when [257] => where [258] => while [259] => window [260] => with [261] => write [262] => xor [263] => year_month [264] => zerofill ) ) [type] => -> [args] => Array ( [0] => mysql:host=localhost;port=3306;charset=utf8;dbname=hitrahr [1] => root [2] => asdf [3] => Array ( [1000] => 1 [20] => 1 [17] => 1 [1013] => ) ) ) [4] => Array ( [file] => /apps/hitra7/drupal7/includes/database/database.inc [line] => 1796 [function] => __construct [class] => DatabaseConnection_mysql [object] => DatabaseConnection_mysql Object ( [target:protected] => [key:protected] => [logger:protected] => [transactionLayers:protected] => Array ( ) [driverClasses:protected] => Array ( ) [statementClass:protected] => DatabaseStatementBase [transactionSupport:protected] => 1 [transactionalDDLSupport:protected] => [temporaryNameIndex:protected] => 0 [connection:protected] => [connectionOptions:protected] => Array ( [driver] => mysql [database] => hitrahr [username] => root [password] => asdf [host] => localhost [prefix] => Array ( [default] => ) ) [schema:protected] => [prefixes:protected] => Array ( [default] => ) [prefixSearch:protected] => Array ( [0] => { [1] => } ) [prefixReplace:protected] => Array ( [0] => [1] => ) [escapedNames:protected] => Array ( ) [escapedAliases:protected] => Array ( ) [unprefixedTablesMap:protected] => Array ( ) [needsCleanup:protected] => [reservedKeyWords:DatabaseConnection_mysql:private] => Array ( [0] => accessible [1] => add [2] => admin [3] => all [4] => alter [5] => analyze [6] => and [7] => as [8] => asc [9] => asensitive [10] => before [11] => between [12] => bigint [13] => binary [14] => blob [15] => both [16] => by [17] => call [18] => cascade [19] => case [20] => change [21] => char [22] => character [23] => check [24] => collate [25] => column [26] => condition [27] => constraint [28] => continue [29] => convert [30] => create [31] => cross [32] => cube [33] => cume_dist [34] => current_date [35] => current_time [36] => current_timestamp [37] => current_user [38] => cursor [39] => database [40] => databases [41] => day_hour [42] => day_microsecond [43] => day_minute [44] => day_second [45] => dec [46] => decimal [47] => declare [48] => default [49] => delayed [50] => delete [51] => dense_rank [52] => desc [53] => describe [54] => deterministic [55] => distinct [56] => distinctrow [57] => div [58] => double [59] => drop [60] => dual [61] => each [62] => else [63] => elseif [64] => empty [65] => enclosed [66] => escaped [67] => except [68] => exists [69] => exit [70] => explain [71] => false [72] => fetch [73] => first_value [74] => float [75] => float4 [76] => float8 [77] => for [78] => force [79] => foreign [80] => from [81] => fulltext [82] => function [83] => generated [84] => get [85] => grant [86] => group [87] => grouping [88] => groups [89] => having [90] => high_priority [91] => hour_microsecond [92] => hour_minute [93] => hour_second [94] => if [95] => ignore [96] => in [97] => index [98] => infile [99] => inner [100] => inout [101] => insensitive [102] => insert [103] => int [104] => int1 [105] => int2 [106] => int3 [107] => int4 [108] => int8 [109] => integer [110] => intersect [111] => interval [112] => into [113] => io_after_gtids [114] => io_before_gtids [115] => is [116] => iterate [117] => join [118] => json_table [119] => key [120] => keys [121] => kill [122] => lag [123] => last_value [124] => lateral [125] => lead [126] => leading [127] => leave [128] => left [129] => like [130] => limit [131] => linear [132] => lines [133] => load [134] => localtime [135] => localtimestamp [136] => lock [137] => long [138] => longblob [139] => longtext [140] => loop [141] => low_priority [142] => master_bind [143] => master_ssl_verify_server_cert [144] => match [145] => maxvalue [146] => mediumblob [147] => mediumint [148] => mediumtext [149] => middleint [150] => minute_microsecond [151] => minute_second [152] => mod [153] => modifies [154] => natural [155] => not [156] => no_write_to_binlog [157] => nth_value [158] => ntile [159] => null [160] => numeric [161] => of [162] => on [163] => optimize [164] => optimizer_costs [165] => option [166] => optionally [167] => or [168] => order [169] => out [170] => outer [171] => outfile [172] => over [173] => partition [174] => percent_rank [175] => persist [176] => persist_only [177] => precision [178] => primary [179] => procedure [180] => purge [181] => range [182] => rank [183] => read [184] => reads [185] => read_write [186] => real [187] => recursive [188] => references [189] => regexp [190] => release [191] => rename [192] => repeat [193] => replace [194] => require [195] => resignal [196] => restrict [197] => return [198] => revoke [199] => right [200] => rlike [201] => row [202] => rows [203] => row_number [204] => schema [205] => schemas [206] => second_microsecond [207] => select [208] => sensitive [209] => separator [210] => set [211] => show [212] => signal [213] => smallint [214] => spatial [215] => specific [216] => sql [217] => sqlexception [218] => sqlstate [219] => sqlwarning [220] => sql_big_result [221] => sql_calc_found_rows [222] => sql_small_result [223] => ssl [224] => starting [225] => stored [226] => straight_join [227] => system [228] => table [229] => terminated [230] => then [231] => tinyblob [232] => tinyint [233] => tinytext [234] => to [235] => trailing [236] => trigger [237] => true [238] => undo [239] => union [240] => unique [241] => unlock [242] => unsigned [243] => update [244] => usage [245] => use [246] => using [247] => utc_date [248] => utc_time [249] => utc_timestamp [250] => values [251] => varbinary [252] => varchar [253] => varcharacter [254] => varying [255] => virtual [256] => when [257] => where [258] => while [259] => window [260] => with [261] => write [262] => xor [263] => year_month [264] => zerofill ) ) [type] => -> [args] => Array ( [0] => Array ( [driver] => mysql [database] => hitrahr [username] => root [password] => asdf [host] => localhost [prefix] => Array ( [default] => ) [pdo] => Array ( [1000] => 1 [20] => 1 [17] => 1 [1013] => ) ) ) ) [5] => Array ( [file] => /apps/hitra7/drupal7/includes/database/database.inc [line] => 1582 [function] => openConnection [class] => Database [type] => :: [args] => Array ( [0] => hitrahr [1] => default ) ) [6] => Array ( [file] => /apps/hitra7/drupal7/includes/database/database.inc [line] => 2467 [function] => getConnection [class] => Database [type] => :: [args] => Array ( [0] => default ) ) [7] => Array ( [file] => /apps/nobleprog-website/includes/functions/new-modules-general-functions.php [line] => 31 [function] => db_query [args] => Array ( [0] => SELECT entity_id FROM field_data_field_url_alias WHERE field_url_alias_value = :alias AND entity_type = 'taxonomy_term' AND language = :language [1] => Array ( [:alias] => cc [:language] => en ) ) ) [8] => Array ( [file] => /apps/nobleprog-website/includes/functions/category-functions.php [line] => 149 [function] => np_db_query [args] => Array ( [0] => hitrahr [1] => db_query [2] => SELECT entity_id FROM field_data_field_url_alias WHERE field_url_alias_value = :alias AND entity_type = 'taxonomy_term' AND language = :language [3] => Array ( [:alias] => cc [:language] => en ) ) ) [9] => Array ( [file] => /apps/nobleprog-website/routes.logic.php [line] => 75 [function] => category_validate_url_alias [args] => Array ( [0] => cc ) ) [10] => Array ( [file] => /apps/nobleprog-website/__index.php [line] => 86 [function] => check_for_module [args] => Array ( [0] => /en/cc/cl-ans [1] => Array ( [0] => [1] => cc [2] => cl-ans [3] => en ) ) ) [11] => Array ( [file] => /apps/nobleprog-website/_index.php [line] => 26 [args] => Array ( [0] => /apps/nobleprog-website/__index.php ) [function] => include_once ) [12] => Array ( [file] => /apps/hitra7/index.php [line] => 54 [args] => Array ( [0] => /apps/nobleprog-website/_index.php ) [function] => include_once ) ) NP URI: www.nobleprog.com.ec/en/cc/cl-ans Undefined array key "mysql_identifier_quote_character" /apps/nobleprog-website/includes/functions/new-modules-general-functions.php:82 Array ( [0] => Array ( [file] => /apps/nobleprog-website/includes/functions/new-modules-general-functions.php [line] => 82 [function] => myErrorHandler [args] => Array ( [0] => 2 [1] => Undefined array key "mysql_identifier_quote_character" [2] => /apps/nobleprog-website/includes/functions/new-modules-general-functions.php [3] => 82 ) ) [1] => Array ( [file] => /apps/hitra7/drupal7/includes/database/mysql/database.inc [line] => 397 [function] => variable_get [args] => Array ( [0] => mysql_identifier_quote_character [1] => ` ) ) [2] => Array ( [file] => /apps/hitra7/drupal7/includes/database/database.inc [line] => 329 [function] => setPrefix [class] => DatabaseConnection_mysql [object] => DatabaseConnection_mysql Object ( [target:protected] => [key:protected] => [logger:protected] => [transactionLayers:protected] => Array ( ) [driverClasses:protected] => Array ( ) [statementClass:protected] => DatabaseStatementBase [transactionSupport:protected] => 1 [transactionalDDLSupport:protected] => [temporaryNameIndex:protected] => 0 [connection:protected] => [connectionOptions:protected] => Array ( [driver] => mysql [database] => common_fe [username] => root [password] => asdf [host] => localhost [prefix] => Array ( [default] => ) ) [schema:protected] => [prefixes:protected] => Array ( [default] => ) [prefixSearch:protected] => Array ( [0] => { [1] => } ) [prefixReplace:protected] => Array ( [0] => [1] => ) [escapedNames:protected] => Array ( ) [escapedAliases:protected] => Array ( ) [unprefixedTablesMap:protected] => Array ( ) [needsCleanup:protected] => [reservedKeyWords:DatabaseConnection_mysql:private] => Array ( [0] => accessible [1] => add [2] => admin [3] => all [4] => alter [5] => analyze [6] => and [7] => as [8] => asc [9] => asensitive [10] => before [11] => between [12] => bigint [13] => binary [14] => blob [15] => both [16] => by [17] => call [18] => cascade [19] => case [20] => change [21] => char [22] => character [23] => check [24] => collate [25] => column [26] => condition [27] => constraint [28] => continue [29] => convert [30] => create [31] => cross [32] => cube [33] => cume_dist [34] => current_date [35] => current_time [36] => current_timestamp [37] => current_user [38] => cursor [39] => database [40] => databases [41] => day_hour [42] => day_microsecond [43] => day_minute [44] => day_second [45] => dec [46] => decimal [47] => declare [48] => default [49] => delayed [50] => delete [51] => dense_rank [52] => desc [53] => describe [54] => deterministic [55] => distinct [56] => distinctrow [57] => div [58] => double [59] => drop [60] => dual [61] => each [62] => else [63] => elseif [64] => empty [65] => enclosed [66] => escaped [67] => except [68] => exists [69] => exit [70] => explain [71] => false [72] => fetch [73] => first_value [74] => float [75] => float4 [76] => float8 [77] => for [78] => force [79] => foreign [80] => from [81] => fulltext [82] => function [83] => generated [84] => get [85] => grant [86] => group [87] => grouping [88] => groups [89] => having [90] => high_priority [91] => hour_microsecond [92] => hour_minute [93] => hour_second [94] => if [95] => ignore [96] => in [97] => index [98] => infile [99] => inner [100] => inout [101] => insensitive [102] => insert [103] => int [104] => int1 [105] => int2 [106] => int3 [107] => int4 [108] => int8 [109] => integer [110] => intersect [111] => interval [112] => into [113] => io_after_gtids [114] => io_before_gtids [115] => is [116] => iterate [117] => join [118] => json_table [119] => key [120] => keys [121] => kill [122] => lag [123] => last_value [124] => lateral [125] => lead [126] => leading [127] => leave [128] => left [129] => like [130] => limit [131] => linear [132] => lines [133] => load [134] => localtime [135] => localtimestamp [136] => lock [137] => long [138] => longblob [139] => longtext [140] => loop [141] => low_priority [142] => master_bind [143] => master_ssl_verify_server_cert [144] => match [145] => maxvalue [146] => mediumblob [147] => mediumint [148] => mediumtext [149] => middleint [150] => minute_microsecond [151] => minute_second [152] => mod [153] => modifies [154] => natural [155] => not [156] => no_write_to_binlog [157] => nth_value [158] => ntile [159] => null [160] => numeric [161] => of [162] => on [163] => optimize [164] => optimizer_costs [165] => option [166] => optionally [167] => or [168] => order [169] => out [170] => outer [171] => outfile [172] => over [173] => partition [174] => percent_rank [175] => persist [176] => persist_only [177] => precision [178] => primary [179] => procedure [180] => purge [181] => range [182] => rank [183] => read [184] => reads [185] => read_write [186] => real [187] => recursive [188] => references [189] => regexp [190] => release [191] => rename [192] => repeat [193] => replace [194] => require [195] => resignal [196] => restrict [197] => return [198] => revoke [199] => right [200] => rlike [201] => row [202] => rows [203] => row_number [204] => schema [205] => schemas [206] => second_microsecond [207] => select [208] => sensitive [209] => separator [210] => set [211] => show [212] => signal [213] => smallint [214] => spatial [215] => specific [216] => sql [217] => sqlexception [218] => sqlstate [219] => sqlwarning [220] => sql_big_result [221] => sql_calc_found_rows [222] => sql_small_result [223] => ssl [224] => starting [225] => stored [226] => straight_join [227] => system [228] => table [229] => terminated [230] => then [231] => tinyblob [232] => tinyint [233] => tinytext [234] => to [235] => trailing [236] => trigger [237] => true [238] => undo [239] => union [240] => unique [241] => unlock [242] => unsigned [243] => update [244] => usage [245] => use [246] => using [247] => utc_date [248] => utc_time [249] => utc_timestamp [250] => values [251] => varbinary [252] => varchar [253] => varcharacter [254] => varying [255] => virtual [256] => when [257] => where [258] => while [259] => window [260] => with [261] => write [262] => xor [263] => year_month [264] => zerofill ) ) [type] => -> [args] => Array ( [0] => Array ( [default] => ) ) ) [3] => Array ( [file] => /apps/hitra7/drupal7/includes/database/mysql/database.inc [line] => 349 [function] => __construct [class] => DatabaseConnection [object] => DatabaseConnection_mysql Object ( [target:protected] => [key:protected] => [logger:protected] => [transactionLayers:protected] => Array ( ) [driverClasses:protected] => Array ( ) [statementClass:protected] => DatabaseStatementBase [transactionSupport:protected] => 1 [transactionalDDLSupport:protected] => [temporaryNameIndex:protected] => 0 [connection:protected] => [connectionOptions:protected] => Array ( [driver] => mysql [database] => common_fe [username] => root [password] => asdf [host] => localhost [prefix] => Array ( [default] => ) ) [schema:protected] => [prefixes:protected] => Array ( [default] => ) [prefixSearch:protected] => Array ( [0] => { [1] => } ) [prefixReplace:protected] => Array ( [0] => [1] => ) [escapedNames:protected] => Array ( ) [escapedAliases:protected] => Array ( ) [unprefixedTablesMap:protected] => Array ( ) [needsCleanup:protected] => [reservedKeyWords:DatabaseConnection_mysql:private] => Array ( [0] => accessible [1] => add [2] => admin [3] => all [4] => alter [5] => analyze [6] => and [7] => as [8] => asc [9] => asensitive [10] => before [11] => between [12] => bigint [13] => binary [14] => blob [15] => both [16] => by [17] => call [18] => cascade [19] => case [20] => change [21] => char [22] => character [23] => check [24] => collate [25] => column [26] => condition [27] => constraint [28] => continue [29] => convert [30] => create [31] => cross [32] => cube [33] => cume_dist [34] => current_date [35] => current_time [36] => current_timestamp [37] => current_user [38] => cursor [39] => database [40] => databases [41] => day_hour [42] => day_microsecond [43] => day_minute [44] => day_second [45] => dec [46] => decimal [47] => declare [48] => default [49] => delayed [50] => delete [51] => dense_rank [52] => desc [53] => describe [54] => deterministic [55] => distinct [56] => distinctrow [57] => div [58] => double [59] => drop [60] => dual [61] => each [62] => else [63] => elseif [64] => empty [65] => enclosed [66] => escaped [67] => except [68] => exists [69] => exit [70] => explain [71] => false [72] => fetch [73] => first_value [74] => float [75] => float4 [76] => float8 [77] => for [78] => force [79] => foreign [80] => from [81] => fulltext [82] => function [83] => generated [84] => get [85] => grant [86] => group [87] => grouping [88] => groups [89] => having [90] => high_priority [91] => hour_microsecond [92] => hour_minute [93] => hour_second [94] => if [95] => ignore [96] => in [97] => index [98] => infile [99] => inner [100] => inout [101] => insensitive [102] => insert [103] => int [104] => int1 [105] => int2 [106] => int3 [107] => int4 [108] => int8 [109] => integer [110] => intersect [111] => interval [112] => into [113] => io_after_gtids [114] => io_before_gtids [115] => is [116] => iterate [117] => join [118] => json_table [119] => key [120] => keys [121] => kill [122] => lag [123] => last_value [124] => lateral [125] => lead [126] => leading [127] => leave [128] => left [129] => like [130] => limit [131] => linear [132] => lines [133] => load [134] => localtime [135] => localtimestamp [136] => lock [137] => long [138] => longblob [139] => longtext [140] => loop [141] => low_priority [142] => master_bind [143] => master_ssl_verify_server_cert [144] => match [145] => maxvalue [146] => mediumblob [147] => mediumint [148] => mediumtext [149] => middleint [150] => minute_microsecond [151] => minute_second [152] => mod [153] => modifies [154] => natural [155] => not [156] => no_write_to_binlog [157] => nth_value [158] => ntile [159] => null [160] => numeric [161] => of [162] => on [163] => optimize [164] => optimizer_costs [165] => option [166] => optionally [167] => or [168] => order [169] => out [170] => outer [171] => outfile [172] => over [173] => partition [174] => percent_rank [175] => persist [176] => persist_only [177] => precision [178] => primary [179] => procedure [180] => purge [181] => range [182] => rank [183] => read [184] => reads [185] => read_write [186] => real [187] => recursive [188] => references [189] => regexp [190] => release [191] => rename [192] => repeat [193] => replace [194] => require [195] => resignal [196] => restrict [197] => return [198] => revoke [199] => right [200] => rlike [201] => row [202] => rows [203] => row_number [204] => schema [205] => schemas [206] => second_microsecond [207] => select [208] => sensitive [209] => separator [210] => set [211] => show [212] => signal [213] => smallint [214] => spatial [215] => specific [216] => sql [217] => sqlexception [218] => sqlstate [219] => sqlwarning [220] => sql_big_result [221] => sql_calc_found_rows [222] => sql_small_result [223] => ssl [224] => starting [225] => stored [226] => straight_join [227] => system [228] => table [229] => terminated [230] => then [231] => tinyblob [232] => tinyint [233] => tinytext [234] => to [235] => trailing [236] => trigger [237] => true [238] => undo [239] => union [240] => unique [241] => unlock [242] => unsigned [243] => update [244] => usage [245] => use [246] => using [247] => utc_date [248] => utc_time [249] => utc_timestamp [250] => values [251] => varbinary [252] => varchar [253] => varcharacter [254] => varying [255] => virtual [256] => when [257] => where [258] => while [259] => window [260] => with [261] => write [262] => xor [263] => year_month [264] => zerofill ) ) [type] => -> [args] => Array ( [0] => mysql:host=localhost;port=3306;charset=utf8;dbname=common_fe [1] => root [2] => asdf [3] => Array ( [1000] => 1 [20] => 1 [17] => 1 [1013] => ) ) ) [4] => Array ( [file] => /apps/hitra7/drupal7/includes/database/database.inc [line] => 1796 [function] => __construct [class] => DatabaseConnection_mysql [object] => DatabaseConnection_mysql Object ( [target:protected] => [key:protected] => [logger:protected] => [transactionLayers:protected] => Array ( ) [driverClasses:protected] => Array ( ) [statementClass:protected] => DatabaseStatementBase [transactionSupport:protected] => 1 [transactionalDDLSupport:protected] => [temporaryNameIndex:protected] => 0 [connection:protected] => [connectionOptions:protected] => Array ( [driver] => mysql [database] => common_fe [username] => root [password] => asdf [host] => localhost [prefix] => Array ( [default] => ) ) [schema:protected] => [prefixes:protected] => Array ( [default] => ) [prefixSearch:protected] => Array ( [0] => { [1] => } ) [prefixReplace:protected] => Array ( [0] => [1] => ) [escapedNames:protected] => Array ( ) [escapedAliases:protected] => Array ( ) [unprefixedTablesMap:protected] => Array ( ) [needsCleanup:protected] => [reservedKeyWords:DatabaseConnection_mysql:private] => Array ( [0] => accessible [1] => add [2] => admin [3] => all [4] => alter [5] => analyze [6] => and [7] => as [8] => asc [9] => asensitive [10] => before [11] => between [12] => bigint [13] => binary [14] => blob [15] => both [16] => by [17] => call [18] => cascade [19] => case [20] => change [21] => char [22] => character [23] => check [24] => collate [25] => column [26] => condition [27] => constraint [28] => continue [29] => convert [30] => create [31] => cross [32] => cube [33] => cume_dist [34] => current_date [35] => current_time [36] => current_timestamp [37] => current_user [38] => cursor [39] => database [40] => databases [41] => day_hour [42] => day_microsecond [43] => day_minute [44] => day_second [45] => dec [46] => decimal [47] => declare [48] => default [49] => delayed [50] => delete [51] => dense_rank [52] => desc [53] => describe [54] => deterministic [55] => distinct [56] => distinctrow [57] => div [58] => double [59] => drop [60] => dual [61] => each [62] => else [63] => elseif [64] => empty [65] => enclosed [66] => escaped [67] => except [68] => exists [69] => exit [70] => explain [71] => false [72] => fetch [73] => first_value [74] => float [75] => float4 [76] => float8 [77] => for [78] => force [79] => foreign [80] => from [81] => fulltext [82] => function [83] => generated [84] => get [85] => grant [86] => group [87] => grouping [88] => groups [89] => having [90] => high_priority [91] => hour_microsecond [92] => hour_minute [93] => hour_second [94] => if [95] => ignore [96] => in [97] => index [98] => infile [99] => inner [100] => inout [101] => insensitive [102] => insert [103] => int [104] => int1 [105] => int2 [106] => int3 [107] => int4 [108] => int8 [109] => integer [110] => intersect [111] => interval [112] => into [113] => io_after_gtids [114] => io_before_gtids [115] => is [116] => iterate [117] => join [118] => json_table [119] => key [120] => keys [121] => kill [122] => lag [123] => last_value [124] => lateral [125] => lead [126] => leading [127] => leave [128] => left [129] => like [130] => limit [131] => linear [132] => lines [133] => load [134] => localtime [135] => localtimestamp [136] => lock [137] => long [138] => longblob [139] => longtext [140] => loop [141] => low_priority [142] => master_bind [143] => master_ssl_verify_server_cert [144] => match [145] => maxvalue [146] => mediumblob [147] => mediumint [148] => mediumtext [149] => middleint [150] => minute_microsecond [151] => minute_second [152] => mod [153] => modifies [154] => natural [155] => not [156] => no_write_to_binlog [157] => nth_value [158] => ntile [159] => null [160] => numeric [161] => of [162] => on [163] => optimize [164] => optimizer_costs [165] => option [166] => optionally [167] => or [168] => order [169] => out [170] => outer [171] => outfile [172] => over [173] => partition [174] => percent_rank [175] => persist [176] => persist_only [177] => precision [178] => primary [179] => procedure [180] => purge [181] => range [182] => rank [183] => read [184] => reads [185] => read_write [186] => real [187] => recursive [188] => references [189] => regexp [190] => release [191] => rename [192] => repeat [193] => replace [194] => require [195] => resignal [196] => restrict [197] => return [198] => revoke [199] => right [200] => rlike [201] => row [202] => rows [203] => row_number [204] => schema [205] => schemas [206] => second_microsecond [207] => select [208] => sensitive [209] => separator [210] => set [211] => show [212] => signal [213] => smallint [214] => spatial [215] => specific [216] => sql [217] => sqlexception [218] => sqlstate [219] => sqlwarning [220] => sql_big_result [221] => sql_calc_found_rows [222] => sql_small_result [223] => ssl [224] => starting [225] => stored [226] => straight_join [227] => system [228] => table [229] => terminated [230] => then [231] => tinyblob [232] => tinyint [233] => tinytext [234] => to [235] => trailing [236] => trigger [237] => true [238] => undo [239] => union [240] => unique [241] => unlock [242] => unsigned [243] => update [244] => usage [245] => use [246] => using [247] => utc_date [248] => utc_time [249] => utc_timestamp [250] => values [251] => varbinary [252] => varchar [253] => varcharacter [254] => varying [255] => virtual [256] => when [257] => where [258] => while [259] => window [260] => with [261] => write [262] => xor [263] => year_month [264] => zerofill ) ) [type] => -> [args] => Array ( [0] => Array ( [driver] => mysql [database] => common_fe [username] => root [password] => asdf [host] => localhost [prefix] => Array ( [default] => ) [pdo] => Array ( [1000] => 1 [20] => 1 [17] => 1 [1013] => ) ) ) ) [5] => Array ( [file] => /apps/hitra7/drupal7/includes/database/database.inc [line] => 1582 [function] => openConnection [class] => Database [type] => :: [args] => Array ( [0] => common_fe [1] => default ) ) [6] => Array ( [file] => /apps/hitra7/drupal7/includes/database/database.inc [line] => 2467 [function] => getConnection [class] => Database [type] => :: [args] => Array ( [0] => default ) ) [7] => Array ( [file] => /apps/nobleprog-website/includes/functions/new-modules-general-functions.php [line] => 31 [function] => db_query [args] => Array ( [0] => SELECT * FROM price_formulas WHERE country_code = :country_code [1] => Array ( [:country_code] => ec ) ) ) [8] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 111 [function] => np_db_query [args] => Array ( [0] => common_fe [1] => db_query [2] => SELECT * FROM price_formulas WHERE country_code = :country_code [3] => Array ( [:country_code] => ec ) ) ) [9] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 93 [function] => get_formula [args] => Array ( [0] => ec ) ) [10] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 355 [function] => course_price_v2_formula [args] => Array ( ) ) [11] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 344 [function] => course_price_change_to_fe_p [args] => Array ( [0] => cl-ans [1] => 21 [2] => uk_premium,ca_high,za_premium,pl_2000 [3] => 0 [4] => [5] => USD ) ) [12] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 316 [function] => course_price_get_default_price [args] => Array ( [0] => cl-ans ) ) [13] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 15 [function] => course_price_get_price [args] => Array ( [0] => cl-ans ) ) [14] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 23 [function] => course_price_virtual_event_price [args] => Array ( [0] => cl-ans ) ) [15] => Array ( [file] => /apps/nobleprog-website/core/routes.php [line] => 19 [function] => course_menu_callback [args] => Array ( [0] => /en/cc/cl-ans ) ) [16] => Array ( [file] => /apps/nobleprog-website/__index.php [line] => 100 [args] => Array ( [0] => /apps/nobleprog-website/core/routes.php ) [function] => require_once ) [17] => Array ( [file] => /apps/nobleprog-website/_index.php [line] => 26 [args] => Array ( [0] => /apps/nobleprog-website/__index.php ) [function] => include_once ) [18] => Array ( [file] => /apps/hitra7/index.php [line] => 54 [args] => Array ( [0] => /apps/nobleprog-website/_index.php ) [function] => include_once ) ) NP URI: www.nobleprog.com.ec/en/cc/cl-ans Undefined array key "sdp" /apps/nobleprog-website/includes/functions/course-prices.php:281 Array ( [0] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 281 [function] => myErrorHandler [args] => Array ( [0] => 2 [1] => Undefined array key "sdp" [2] => /apps/nobleprog-website/includes/functions/course-prices.php [3] => 281 ) ) [1] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 45 [function] => course_price_table [args] => Array ( [0] => Array ( [fdp] => 7937 [adp] => 1237 [reduced_fdp] => [reduced_adp] => [days] => 3 [default_venue_fdc] => 350 [default_venue_adc] => 50 [people] => 1 [hours] => 21 [course_code] => cl-ans [venue_id] => ec_15661446 [vfdc] => 175.00 [vadc] => 60.00 ) [1] => 10 ) ) [2] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 23 [function] => course_price_virtual_event_price [args] => Array ( [0] => cl-ans ) ) [3] => Array ( [file] => /apps/nobleprog-website/core/routes.php [line] => 19 [function] => course_menu_callback [args] => Array ( [0] => /en/cc/cl-ans ) ) [4] => Array ( [file] => /apps/nobleprog-website/__index.php [line] => 100 [args] => Array ( [0] => /apps/nobleprog-website/core/routes.php ) [function] => require_once ) [5] => Array ( [file] => /apps/nobleprog-website/_index.php [line] => 26 [args] => Array ( [0] => /apps/nobleprog-website/__index.php ) [function] => include_once ) [6] => Array ( [file] => /apps/hitra7/index.php [line] => 54 [args] => Array ( [0] => /apps/nobleprog-website/_index.php ) [function] => include_once ) ) NP URI: www.nobleprog.com.ec/en/cc/cl-ans Undefined array key "nobleprog_default_trainer_journey" /apps/nobleprog-website/includes/functions/course-prices.php:286 Array ( [0] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 286 [function] => myErrorHandler [args] => Array ( [0] => 2 [1] => Undefined array key "nobleprog_default_trainer_journey" [2] => /apps/nobleprog-website/includes/functions/course-prices.php [3] => 286 ) ) [1] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 45 [function] => course_price_table [args] => Array ( [0] => Array ( [fdp] => 7937 [adp] => 1237 [reduced_fdp] => [reduced_adp] => [days] => 3 [default_venue_fdc] => 350 [default_venue_adc] => 50 [people] => 1 [hours] => 21 [course_code] => cl-ans [venue_id] => ec_15661446 [vfdc] => 175.00 [vadc] => 60.00 ) [1] => 10 ) ) [2] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 23 [function] => course_price_virtual_event_price [args] => Array ( [0] => cl-ans ) ) [3] => Array ( [file] => /apps/nobleprog-website/core/routes.php [line] => 19 [function] => course_menu_callback [args] => Array ( [0] => /en/cc/cl-ans ) ) [4] => Array ( [file] => /apps/nobleprog-website/__index.php [line] => 100 [args] => Array ( [0] => /apps/nobleprog-website/core/routes.php ) [function] => require_once ) [5] => Array ( [file] => /apps/nobleprog-website/_index.php [line] => 26 [args] => Array ( [0] => /apps/nobleprog-website/__index.php ) [function] => include_once ) [6] => Array ( [file] => /apps/hitra7/index.php [line] => 54 [args] => Array ( [0] => /apps/nobleprog-website/_index.php ) [function] => include_once ) ) NP URI: www.nobleprog.com.ec/en/cc/cl-ans Undefined array key "nobleprog_price_rounding" /apps/nobleprog-website/includes/functions/course-prices.php:289 Array ( [0] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 289 [function] => myErrorHandler [args] => Array ( [0] => 2 [1] => Undefined array key "nobleprog_price_rounding" [2] => /apps/nobleprog-website/includes/functions/course-prices.php [3] => 289 ) ) [1] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 45 [function] => course_price_table [args] => Array ( [0] => Array ( [fdp] => 7937 [adp] => 1237 [reduced_fdp] => [reduced_adp] => [days] => 3 [default_venue_fdc] => 350 [default_venue_adc] => 50 [people] => 1 [hours] => 21 [course_code] => cl-ans [venue_id] => ec_15661446 [vfdc] => 175.00 [vadc] => 60.00 ) [1] => 10 ) ) [2] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 23 [function] => course_price_virtual_event_price [args] => Array ( [0] => cl-ans ) ) [3] => Array ( [file] => /apps/nobleprog-website/core/routes.php [line] => 19 [function] => course_menu_callback [args] => Array ( [0] => /en/cc/cl-ans ) ) [4] => Array ( [file] => /apps/nobleprog-website/__index.php [line] => 100 [args] => Array ( [0] => /apps/nobleprog-website/core/routes.php ) [function] => require_once ) [5] => Array ( [file] => /apps/nobleprog-website/_index.php [line] => 26 [args] => Array ( [0] => /apps/nobleprog-website/__index.php ) [function] => include_once ) [6] => Array ( [file] => /apps/hitra7/index.php [line] => 54 [args] => Array ( [0] => /apps/nobleprog-website/_index.php ) [function] => include_once ) ) NP URI: www.nobleprog.com.ec/en/cc/cl-ans Undefined array key "sdp" /apps/nobleprog-website/includes/functions/course-prices.php:281 Array ( [0] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 281 [function] => myErrorHandler [args] => Array ( [0] => 2 [1] => Undefined array key "sdp" [2] => /apps/nobleprog-website/includes/functions/course-prices.php [3] => 281 ) ) [1] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 45 [function] => course_price_table [args] => Array ( [0] => Array ( [fdp] => 7937 [adp] => 1237 [reduced_fdp] => [reduced_adp] => [days] => 3 [default_venue_fdc] => 350 [default_venue_adc] => 50 [people] => 1 [hours] => 21 [course_code] => cl-ans [venue_id] => ec_15661447 [vfdc] => 200.00 [vadc] => 50.00 ) [1] => 10 ) ) [2] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 23 [function] => course_price_virtual_event_price [args] => Array ( [0] => cl-ans ) ) [3] => Array ( [file] => /apps/nobleprog-website/core/routes.php [line] => 19 [function] => course_menu_callback [args] => Array ( [0] => /en/cc/cl-ans ) ) [4] => Array ( [file] => /apps/nobleprog-website/__index.php [line] => 100 [args] => Array ( [0] => /apps/nobleprog-website/core/routes.php ) [function] => require_once ) [5] => Array ( [file] => /apps/nobleprog-website/_index.php [line] => 26 [args] => Array ( [0] => /apps/nobleprog-website/__index.php ) [function] => include_once ) [6] => Array ( [file] => /apps/hitra7/index.php [line] => 54 [args] => Array ( [0] => /apps/nobleprog-website/_index.php ) [function] => include_once ) ) NP URI: www.nobleprog.com.ec/en/cc/cl-ans Undefined array key "nobleprog_default_trainer_journey" /apps/nobleprog-website/includes/functions/course-prices.php:286 Array ( [0] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 286 [function] => myErrorHandler [args] => Array ( [0] => 2 [1] => Undefined array key "nobleprog_default_trainer_journey" [2] => /apps/nobleprog-website/includes/functions/course-prices.php [3] => 286 ) ) [1] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 45 [function] => course_price_table [args] => Array ( [0] => Array ( [fdp] => 7937 [adp] => 1237 [reduced_fdp] => [reduced_adp] => [days] => 3 [default_venue_fdc] => 350 [default_venue_adc] => 50 [people] => 1 [hours] => 21 [course_code] => cl-ans [venue_id] => ec_15661447 [vfdc] => 200.00 [vadc] => 50.00 ) [1] => 10 ) ) [2] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 23 [function] => course_price_virtual_event_price [args] => Array ( [0] => cl-ans ) ) [3] => Array ( [file] => /apps/nobleprog-website/core/routes.php [line] => 19 [function] => course_menu_callback [args] => Array ( [0] => /en/cc/cl-ans ) ) [4] => Array ( [file] => /apps/nobleprog-website/__index.php [line] => 100 [args] => Array ( [0] => /apps/nobleprog-website/core/routes.php ) [function] => require_once ) [5] => Array ( [file] => /apps/nobleprog-website/_index.php [line] => 26 [args] => Array ( [0] => /apps/nobleprog-website/__index.php ) [function] => include_once ) [6] => Array ( [file] => /apps/hitra7/index.php [line] => 54 [args] => Array ( [0] => /apps/nobleprog-website/_index.php ) [function] => include_once ) ) NP URI: www.nobleprog.com.ec/en/cc/cl-ans Undefined array key "nobleprog_price_rounding" /apps/nobleprog-website/includes/functions/course-prices.php:289 Array ( [0] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 289 [function] => myErrorHandler [args] => Array ( [0] => 2 [1] => Undefined array key "nobleprog_price_rounding" [2] => /apps/nobleprog-website/includes/functions/course-prices.php [3] => 289 ) ) [1] => Array ( [file] => /apps/nobleprog-website/includes/functions/course-prices.php [line] => 45 [function] => course_price_table [args] => Array ( [0] => Array ( [fdp] => 7937 [adp] => 1237 [reduced_fdp] => [reduced_adp] => [days] => 3 [default_venue_fdc] => 350 [default_venue_adc] => 50 [people] => 1 [hours] => 21 [course_code] => cl-ans [venue_id] => ec_15661447 [vfdc] => 200.00 [vadc] => 50.00 ) [1] => 10 ) ) [2] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 23 [function] => course_price_virtual_event_price [args] => Array ( [0] => cl-ans ) ) [3] => Array ( [file] => /apps/nobleprog-website/core/routes.php [line] => 19 [function] => course_menu_callback [args] => Array ( [0] => /en/cc/cl-ans ) ) [4] => Array ( [file] => /apps/nobleprog-website/__index.php [line] => 100 [args] => Array ( [0] => /apps/nobleprog-website/core/routes.php ) [function] => require_once ) [5] => Array ( [file] => /apps/nobleprog-website/_index.php [line] => 26 [args] => Array ( [0] => /apps/nobleprog-website/__index.php ) [function] => include_once ) [6] => Array ( [file] => /apps/hitra7/index.php [line] => 54 [args] => Array ( [0] => /apps/nobleprog-website/_index.php ) [function] => include_once ) ) NP URI: www.nobleprog.com.ec/en/cc/cl-ans Cannot modify header information - headers already sent by (output started at /apps/nobleprog-website/_index.php:16) /apps/nobleprog-website/modules/course/course.php:119 Array ( [0] => Array ( [function] => myErrorHandler [args] => Array ( [0] => 2 [1] => Cannot modify header information - headers already sent by (output started at /apps/nobleprog-website/_index.php:16) [2] => /apps/nobleprog-website/modules/course/course.php [3] => 119 ) ) [1] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 119 [function] => header [args] => Array ( [0] => X-CSRF-Token:Tm9ibGVQcm9nMTcxNjAyMzk5NQ== ) ) [2] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 82 [function] => course_generate_csrf_token [args] => Array ( ) ) [3] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 31 [function] => course_render [args] => Array ( [0] => Array ( [course_code] => cl-ans [hr_nid] => 154869 [title] => Comprehensive C# and .NET Application Security [requirements] => [overview] =>

A number of programming languages are available today to compile code to .NET and ASP.NET frameworks. The environment provides powerful means for security development, but developers should know how to apply the architecture- and coding-level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation.

The aim of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from performing privileged actions, protect resources through strong authentication and authorization, provide remote procedure calls, handle sessions, introduce different implementations for certain functionality, and many more. A special section is devoted to configuration and hardening of the .NET and ASP.NET environment for security.

A brief introduction to the foundations of cryptography provides a common practical baseline for understanding the purpose and the operation of various algorithms, based on which the course presents the cryptographic features that can be used in .NET. This is followed by the introduction of some recent crypto vulnerabilities both related to certain crypto algorithms and cryptographic protocols, as well as side-channel attacks.

Introduction of different vulnerabilities starts with presenting some typical programming problems committed when using .NET, including bug categories of input validation, error handling or race conditions. A special focus is given to XML security, while the topic of ASP.NET-specific vulnerabilities tackles some special issues and attack methods: like attacking the ViewState, or the string termination attacks.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037228 [source_title] => Comprehensive C# and .NET Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) ) [1] => Array ( [0] => stdClass Object ( [tid] => 1377 [alias] => secure-code-training [name] => Secure Code [english_name] => Secure Code [consulting_option] => available ) ) [2] => cl-ans [3] => Array ( [outlines] => Array ( [appsecdev] => stdClass Object ( [course_code] => appsecdev [hr_nid] => 310959 [title] => Application Security for Developers [requirements] =>

Basics of any programming language    
Experience in developing applications

[overview] =>

This course will help professionals understand the value and limits of Application Security. While the Application Security Principals provides valuable awareness around some of the major risks in applications today, this course will highlight both the good and not so good.

This course is crucial because of the increasing need for developers to code in a secure manner. It is critical to introduce security as a quality component into the development cycle. This course aims at educating developers about various security vulnerabilities through hands-on practice using our purposely developed insecure web application.

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037503 [source_title] => Application Security for Developers [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => appsecdev ) [cl-and] => stdClass Object ( [course_code] => cl-and [hr_nid] => 154993 [title] => Android Security [requirements] => [overview] =>

Android is an open platform for mobile devices such as handsets and tablets. It has a large variety of security features to make developing secure software easier; however, it is also missing certain security aspects that are present in other hand-held platforms. The course gives a comprehensive overview of these features, and points out the most critical shortcomings to be aware of related to the underlying Linux, the file system and the environment in general, as well as regarding using permissions and other Android software development components.

Typical security pitfalls and vulnerabilities are described both for native code and Java applications, along with recommendations and best practices to avoid and mitigate them. In many cases discussed issues are supported with real-life examples and case studies. Finally, we give a brief overview on how to use security testing tools to reveal any security relevant programming bugs.

Participants attending this course will 

Audience

Professionals

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037231 [source_title] => Android Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-and ) [cl-anw] => stdClass Object ( [course_code] => cl-anw [hr_nid] => 155017 [title] => Network Security and Secure Communication [requirements] => [overview] =>

Implementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification and anonymity – is given, while also presenting the typical problems that may damage these requirements along with real-world solutions.

As a critical aspect of network security is cryptography, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical background, these elements are discussed from a developer's perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.

Typical crypto vulnerabilities are discussed both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.

Finally, as XML technology is central for data exchange by networked applications, the security aspects of XML are described. This includes the usage of XML within web services and SOAP messages alongside protection measures such as XML signature and XML encryption – as well as weaknesses in those protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.

Participants attending this course will

Audience

Developers, Professionals

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037232 [source_title] => Network Security and Secure Communication [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-anw ) [cl-cjw] => stdClass Object ( [course_code] => cl-cjw [hr_nid] => 154909 [title] => Combined C/C++, JAVA and Web Application Security [requirements] => [overview] =>

To serve in the best way heterogeneous development groups that are using various platforms simultaneously during their everyday work, we have merged various topics into a combined course that presents diverse secure coding subjects in didactic manner on a single training event. This course combines C/C++ and Java platform security to provide an extensive, cross-platform secure coding expertise.

Concerning C/C++, common security vulnerabilities are discussed, backed by practical exercises about the attacking methods that exploit these vulnerabilities, with the focus on the mitigation techniques that can be applied to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation.

Security components and service of Java are discussed by presenting the different APIs and tools through a number of practical exercises where participants can gain hands-on experience in using them. The course also covers security issues of web services and the related Java services that can be applied to prevent the most aching threats of the Internet based services. Finally, web- and Java-related security vulnerabilities are demonstrated by easy-to-understand exercises, which not only show the root cause of the problems, but also demonstrate the attack methods along with the recommended mitigation and coding techniques in order to avoid the associated security problems.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 28 [status] => published [changed] => 1700037230 [source_title] => Combined C/C++, JAVA and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-cjw ) [cl-cls] => stdClass Object ( [course_code] => cl-cls [hr_nid] => 155009 [title] => Application Security in the Cloud [requirements] => [overview] =>

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. Opinions, however, diverge many times even on defining who is responsible for ensuring the security of cloud resources.

Covering IaaS, PaaS and SaaS, first the security of the infrastructure is discussed: hardening and configuration issues as well as various solutions for authentication and authorization alongside identity management that should be at the core of all security architecture. This is followed by some basics regarding legal and contractual issues, namely how trust is established and governed in the cloud.

The journey through cloud security continues with understanding cloud-specific threats and the attackers’ goals and motivations as well as typical attack steps taken against cloud solutions. Special focus is also given to auditing the cloud and providing security evaluation of cloud solutions on all levels, including penetration testing and vulnerability analysis.

The focus of the course is on application security issues, dealing both with data security and the security of the applications themselves. From the standpoint of application security, cloud computing security is not substantially different from general software security, and therefore basically all OWASP-enlisted vulnerabilities are relevant in this domain as well. It is the set of threats and risks that makes the difference, and thus the training is concluded with the enumeration of various cloud-specific attack vectors connected to the weaknesses discussed beforehand.

Participants attending this course will

Audience

Developers, Managers, Professionals

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037232 [source_title] => Application Security in the Cloud [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-cls ) [cl-csc] => stdClass Object ( [course_code] => cl-csc [hr_nid] => 154749 [title] => C/C++ Secure Coding [requirements] =>

Basics of C/C++

[overview] =>

This three day course covers the basics of securing the C/C++ code against the malicious users who may exploit many vulnerabilities in the code with memory management and input handling, the course cover the principals of writing secure code.

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037227 [source_title] => C/C++ Secure Coding [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-csc ) [cl-jad] => stdClass Object ( [course_code] => cl-jad [hr_nid] => 154849 [title] => Advanced Java Security [requirements] => [overview] =>

Even experienced Java programmers are not mastering by all means the various security services offered by Java, and are likewise not aware of the different vulnerabilities that are relevant for web applications written in Java.

The course – besides introducing security components of Standard Java Edition – deals with security issues of Java Enterprise Edition (JEE) and web services. Discussion of specific services is preceded with the foundations of cryptography and secure communication. Various exercises deal with declarative and programmatic security techniques in JEE, while both transport-layer and end-to-end security of web services is discussed. The use of all components is presented through several practical exercises, where participants can try out the discussed APIs and tools for themselves.

The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform and web-related vulnerabilities. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1707138583 [source_title] => Advanced Java Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jad ) [cl-jpw] => stdClass Object ( [course_code] => cl-jpw [hr_nid] => 154917 [title] => Combined JAVA, PHP and Web Application Security [requirements] => [overview] =>

Even experienced programmers do not master by all means the various security services offered by their development platforms, and are likewise not aware of the different vulnerabilities that are relevant for their developments. This course targets developers using both Java and PHP, providing them essential skills necessary to make their applications resistant to contemporary attacks through the Internet.

Levels of Java security architecture are walked through by tackling access control, authentication and authorization, secure communication and various cryptographic functions. Various APIs are also introduced that can be used to secure your code in PHP, like OpenSSL for cryptography or HTML Purifier for input validation. On server side, the best practices are given for hardening and configuring the operating system, the web container, the file system, the SQL server and the PHP itself, while a special focus is given to client-side security through security issues of JavaScript, Ajax and HTML5.

General web vulnerabilities are discussed by examples aligned to the OWASP Top Ten, showing various injection attacks, script injections, attacks against session handling, insecure direct object references, issues with file uploads, and many others. The various Java- and PHP-specific language problems and issues stemming from the runtime environment are introduced grouped into the standard vulnerability types of missing or improper input validation, improper use of security features, incorrect error and exception handling, time- and state-related problems, code quality issues and mobile code-related vulnerabilities.

Participants can try out the discussed APIs, tools and the effects of configurations for themselves, while the introduction of vulnerabilities are all supported by a number of hands-on exercises demonstrating the consequences of successful attacks, showing how to correct the bugs and apply mitigation techniques, and introducing the use of various extensions and tools.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 28 [status] => published [changed] => 1700037231 [source_title] => Combined JAVA, PHP and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jpw ) [cl-jsc] => stdClass Object ( [course_code] => cl-jsc [hr_nid] => 154753 [title] => Standard Java Security [requirements] => [overview] =>

Description

The Java language and the Runtime Environment (JRE) was designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++. Yet, software developers and architects should not only know how to use the various security features of the Java environment (positive security), but should also be aware of the numerous vulnerabilities that are still relevant for Java development (negative security).

The introduction of security services is preceded with a brief overview of the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of these components is presented through several practical exercises, where participants can try out the discussed APIs for themselves.

The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform, covering both the typical bugs committed by Java programmers and the language- and environment-specific issues. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037227 [source_title] => Standard Java Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jsc ) [cl-jwa] => stdClass Object ( [course_code] => cl-jwa [hr_nid] => 154757 [title] => Java and Web Application Security [requirements] => [overview] =>

Description

Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are relevant for web applications written in Java, and the consequences of the various risks.

General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of Java with the most important aim to avoid the associated problems. In addition, a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

The course introduces security components of Standard Java Edition, which is preceded with the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of all components is presented through practical exercises, where participants can try out the discussed APIs and tools for themselves.

Finally, the course explains the most frequent and severe programming flaws of the Java language and platform. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037227 [source_title] => Java and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jwa ) [cl-jwe] => stdClass Object ( [course_code] => cl-jwe [hr_nid] => 154853 [title] => Advanced Java, JEE and Web Application Security [requirements] => [overview] =>

Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are relevant for web applications written in Java, and the consequences of the various risks.

General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of Java with the most important aim to avoid the associated problems. In addition, a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

The course introduces security components of Standard Java Edition, which is preceded with the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. Security issues of Java Enterprise Edition are presented through various exercises explaining both declarative and programmatic security techniques in JEE.

Finally, the course explains the most frequent and severe programming flaws of the Java language and platform. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 28 [status] => published [changed] => 1700037228 [source_title] => Advanced Java, JEE and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jwe ) [cl-njs] => stdClass Object ( [course_code] => cl-njs [hr_nid] => 200321 [title] => Node.JS and Web Application Security [requirements] =>

Basic Web application development

[overview] =>

As a developer, your duty is to write bulletproof code.

What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?

This Web application security course will change the way you look at code. A hands-on training during which we will teach you all the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.

It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

Delegates attending will:

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037257 [source_title] => Node.JS and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-njs ) [cl-nsc] => stdClass Object ( [course_code] => cl-nsc [hr_nid] => 154857 [title] => .NET, C# and ASP.NET Security Development [requirements] => [overview] =>

A number of programming languages are available today to compile code to .NET and ASP.NET frameworks. The environment provides powerful means for security development, but developers should know how to apply the architecture- and coding-level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation.

The aim of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from performing privileged actions, protect resources through strong authentication and authorization, provide remote procedure calls, handle sessions, introduce different implementations for certain functionality, and many more.

Introduction of different vulnerabilities starts with presenting some typical programming problems committed when using .NET, while the discussion of vulnerabilities of the ASP.NET also deals with various environment settings and their effects. Finally, the topic of ASP.NET-specific vulnerabilities not only deals with some general web application security challenges, but also with special issues and attack methods like attacking the ViewState, or the string termination attacks.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037228 [source_title] => .NET, C# and ASP.NET Security Development [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-nsc ) [cl-nwa] => stdClass Object ( [course_code] => cl-nwa [hr_nid] => 154873 [title] => Advanced C#, ASP.NET and Web Application Security [requirements] => [overview] =>

Beyond solid knowledge in using various security features of .NET and ASP.NET, even for experienced programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side along with the consequences of the various risks.

In this course the general web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of ASP.NET. A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

The course also deals with the security architecture and components of the .NET framework, including code- and role based access control, permission declaration and checking mechanisms and the transparency model. A brief introduction to the foundations of cryptography provides a common practical baseline for understanding the purpose and the operation of various algorithms, based on which the course presents the cryptographic features that can be used in .NET.

Introduction of different security bugs follows the well-established vulnerability categories, tackling input validation, security features, error handling, time- and state-related problems, the group of general code quality issues, and a special section on ASP.NET-specific vulnerabilities. These topics are concluded with an overview on testing tools that can be used to automatically reveal some of the learnt bugs.

Topics are presented through practical exercises where participants can try out the consequences of certain vulnerabilities, the mitigations, as well as the discussed APIs and tools for themselves.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037229 [source_title] => Advanced C#, ASP.NET and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-nwa ) [cl-osc] => stdClass Object ( [course_code] => cl-osc [hr_nid] => 155025 [title] => The Secure Coding Landscape [requirements] => [overview] =>

The course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code.

Participants attending this course will 

Audience

Managers

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037233 [source_title] => The Secure Coding Landscape [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-osc ) ) [codes] => Array ( [0] => appsecdev [1] => cl-and [2] => cl-anw [3] => cl-cjw [4] => cl-cls [5] => cl-csc [6] => cl-jad [7] => cl-jpw [8] => cl-jsc [9] => cl-jwa [10] => cl-jwe [11] => cl-njs [12] => cl-nsc [13] => cl-nwa [14] => cl-osc ) ) [4] => Array ( [regions] => Array ( [ec_4966] => Array ( [tid] => ec_4966 [title] => Guayaquil [sales_area] => ec_ecuador [venues] => Array ( [ec_15661446] => Array ( [vid] => ec_15661446 [title] => Guayaquil - Mall del Sol [vfdc] => 175.00 [prices] => Array ( [1] => Array ( [remote guaranteed] => 7937 [classroom guaranteed] => 8462 [remote guaranteed per delegate] => 7937 [delegates] => 1 [adp] => 1237 [classroom guaranteed per delegate] => 8462 ) [2] => Array ( [remote guaranteed] => 9174 [classroom guaranteed] => 9880 [remote guaranteed per delegate] => 4587 [delegates] => 2 [adp] => 1237 [classroom guaranteed per delegate] => 4940 ) [3] => Array ( [remote guaranteed] => 10410 [classroom guaranteed] => 11295 [remote guaranteed per delegate] => 3470 [delegates] => 3 [adp] => 1237 [classroom guaranteed per delegate] => 3765 ) [4] => Array ( [remote guaranteed] => 11648 [classroom guaranteed] => 12712 [remote guaranteed per delegate] => 2912 [delegates] => 4 [adp] => 1237 [classroom guaranteed per delegate] => 3178 ) [5] => Array ( [remote guaranteed] => 12885 [classroom guaranteed] => 14130 [remote guaranteed per delegate] => 2577 [delegates] => 5 [adp] => 1237 [classroom guaranteed per delegate] => 2826 ) [6] => Array ( [remote guaranteed] => 14124 [classroom guaranteed] => 15546 [remote guaranteed per delegate] => 2354 [delegates] => 6 [adp] => 1237 [classroom guaranteed per delegate] => 2591 ) [7] => Array ( [remote guaranteed] => 15358 [classroom guaranteed] => 16961 [remote guaranteed per delegate] => 2194 [delegates] => 7 [adp] => 1237 [classroom guaranteed per delegate] => 2423 ) [8] => Array ( [remote guaranteed] => 16600 [classroom guaranteed] => 18384 [remote guaranteed per delegate] => 2075 [delegates] => 8 [adp] => 1237 [classroom guaranteed per delegate] => 2298 ) [9] => Array ( [remote guaranteed] => 17829 [classroom guaranteed] => 19800 [remote guaranteed per delegate] => 1981 [delegates] => 9 [adp] => 1237 [classroom guaranteed per delegate] => 2200 ) [10] => Array ( [remote guaranteed] => 19070 [classroom guaranteed] => 21220 [remote guaranteed per delegate] => 1907 [delegates] => 10 [adp] => 1237 [classroom guaranteed per delegate] => 2122 ) ) ) ) ) [ec_4967] => Array ( [tid] => ec_4967 [title] => Quito [sales_area] => ec_ecuador [venues] => Array ( [ec_15661447] => Array ( [vid] => ec_15661447 [title] => Quito - Av Eloy Alfaro [vfdc] => 200.00 [prices] => Array ( [1] => Array ( [remote guaranteed] => 7937 [classroom guaranteed] => 8537 [remote guaranteed per delegate] => 7937 [delegates] => 1 [adp] => 1237 [classroom guaranteed per delegate] => 8537 ) [2] => Array ( [remote guaranteed] => 9174 [classroom guaranteed] => 9924 [remote guaranteed per delegate] => 4587 [delegates] => 2 [adp] => 1237 [classroom guaranteed per delegate] => 4962 ) [3] => Array ( [remote guaranteed] => 10410 [classroom guaranteed] => 11310 [remote guaranteed per delegate] => 3470 [delegates] => 3 [adp] => 1237 [classroom guaranteed per delegate] => 3770 ) [4] => Array ( [remote guaranteed] => 11648 [classroom guaranteed] => 12700 [remote guaranteed per delegate] => 2912 [delegates] => 4 [adp] => 1237 [classroom guaranteed per delegate] => 3175 ) [5] => Array ( [remote guaranteed] => 12885 [classroom guaranteed] => 14085 [remote guaranteed per delegate] => 2577 [delegates] => 5 [adp] => 1237 [classroom guaranteed per delegate] => 2817 ) [6] => Array ( [remote guaranteed] => 14124 [classroom guaranteed] => 15474 [remote guaranteed per delegate] => 2354 [delegates] => 6 [adp] => 1237 [classroom guaranteed per delegate] => 2579 ) [7] => Array ( [remote guaranteed] => 15358 [classroom guaranteed] => 16856 [remote guaranteed per delegate] => 2194 [delegates] => 7 [adp] => 1237 [classroom guaranteed per delegate] => 2408 ) [8] => Array ( [remote guaranteed] => 16600 [classroom guaranteed] => 18248 [remote guaranteed per delegate] => 2075 [delegates] => 8 [adp] => 1237 [classroom guaranteed per delegate] => 2281 ) [9] => Array ( [remote guaranteed] => 17829 [classroom guaranteed] => 19629 [remote guaranteed per delegate] => 1981 [delegates] => 9 [adp] => 1237 [classroom guaranteed per delegate] => 2181 ) [10] => Array ( [remote guaranteed] => 19070 [classroom guaranteed] => 21020 [remote guaranteed per delegate] => 1907 [delegates] => 10 [adp] => 1237 [classroom guaranteed per delegate] => 2102 ) ) ) ) ) ) [remote] => Array ( [1] => Array ( [remote guaranteed] => 7937 [remote guaranteed per delegate] => 7937 [adp] => 1237 ) [2] => Array ( [remote guaranteed] => 9174 [remote guaranteed per delegate] => 4587 [adp] => 1237 ) [3] => Array ( [remote guaranteed] => 10410 [remote guaranteed per delegate] => 3470 [adp] => 1237 ) [4] => Array ( [remote guaranteed] => 11648 [remote guaranteed per delegate] => 2912 [adp] => 1237 ) [5] => Array ( [remote guaranteed] => 12885 [remote guaranteed per delegate] => 2577 [adp] => 1237 ) [6] => Array ( [remote guaranteed] => 14124 [remote guaranteed per delegate] => 2354 [adp] => 1237 ) [7] => Array ( [remote guaranteed] => 15358 [remote guaranteed per delegate] => 2194 [adp] => 1237 ) [8] => Array ( [remote guaranteed] => 16600 [remote guaranteed per delegate] => 2075 [adp] => 1237 ) [9] => Array ( [remote guaranteed] => 17829 [remote guaranteed per delegate] => 1981 [adp] => 1237 ) [10] => Array ( [remote guaranteed] => 19070 [remote guaranteed per delegate] => 1907 [adp] => 1237 ) ) [currency] => USD ) [5] => Array ( [0] => 5 ) [6] => Array ( [422727] => Array ( [title] => Comprehensive C# and .NET Application Security [rating] => 5 [delegate_and_company] => Alma Xocua - PASE, Servicios Electrónicos S.A. de C.V. [body] => Me gustó ver desarrollo seguro en ASP.NEt pero hicieron falta ejercicios práticos para implementar en el dia a dia de los desarrolladores [mc] => [is_mt] => 0 [nid] => 422727 ) ) [7] => 5 [8] => 1 [9] => 1 [10] => ) ) [4] => Array ( [file] => /apps/nobleprog-website/core/routes.php [line] => 19 [function] => course_menu_callback [args] => Array ( [0] => /en/cc/cl-ans ) ) [5] => Array ( [file] => /apps/nobleprog-website/__index.php [line] => 100 [args] => Array ( [0] => /apps/nobleprog-website/core/routes.php ) [function] => require_once ) [6] => Array ( [file] => /apps/nobleprog-website/_index.php [line] => 26 [args] => Array ( [0] => /apps/nobleprog-website/__index.php ) [function] => include_once ) [7] => Array ( [file] => /apps/hitra7/index.php [line] => 54 [args] => Array ( [0] => /apps/nobleprog-website/_index.php ) [function] => include_once ) ) Comprehensive C# and .NET Application Security Training Course

Course Outline

  • IT security and secure coding
  • .NET security architecture and services
  • Practical cryptography
  • ASP.NET security architecture
  • Cryptographic vulnerabilities
  • RSA timing attack
  • Features and vulnerabilities
  • Denial of service
  • ASP.NETconfiguration and hardening
  • XML security
  • Common coding errors and vulnerabilities
  • Principles of security and secure coding
  • Knowledge sources
 21 Hours

Number of participants



Price per participant

Testimonials (1)

Related Courses

Application Security for Developers

21 Hours

Android Security

14 Hours

Network Security and Secure Communication

21 Hours

Combined C/C++, JAVA and Web Application Security

28 Hours

Application Security in the Cloud

21 Hours

C/C++ Secure Coding

21 Hours

Advanced Java Security

21 Hours

Combined JAVA, PHP and Web Application Security

28 Hours

Standard Java Security

14 Hours

Java and Web Application Security

21 Hours

Advanced Java, JEE and Web Application Security

28 Hours

Node.JS and Web Application Security

21 Hours

.NET, C# and ASP.NET Security Development

14 Hours

Advanced C#, ASP.NET and Web Application Security

21 Hours

The Secure Coding Landscape

14 Hours

Related Categories

NP URI: www.nobleprog.com.ec/en/cc/cl-ans Undefined array key "nobleprog_site_production_url" /apps/nobleprog-website/includes/functions/new-modules-general-functions.php:82 Array ( [0] => Array ( [file] => /apps/nobleprog-website/includes/functions/new-modules-general-functions.php [line] => 82 [function] => myErrorHandler [args] => Array ( [0] => 2 [1] => Undefined array key "nobleprog_site_production_url" [2] => /apps/nobleprog-website/includes/functions/new-modules-general-functions.php [3] => 82 ) ) [1] => Array ( [file] => /apps/hitra7/drupal7/sites/all/modules/_custom/frontend/islc7/islc7.module [line] => 131 [function] => variable_get [args] => Array ( [0] => nobleprog_site_production_url ) ) [2] => Array ( [file] => /apps/hitra7/drupal7/sites/all/modules/_custom/frontend/islc7/islc7.module [line] => 94 [function] => islc_get_current_site [args] => Array ( ) ) [3] => Array ( [file] => /apps/hitra7/drupal7/sites/all/modules/_custom/frontend/islc7/islc7_block.inc [line] => 34 [function] => islc_get_site_list [args] => Array ( ) ) [4] => Array ( [file] => /apps/nobleprog-website/nptemplates/default.php [line] => 265 [function] => islc7_sites_links_array_v3 [args] => Array ( ) ) [5] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 85 [args] => Array ( [0] => /apps/nobleprog-website/nptemplates/default.php ) [function] => require_once ) [6] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 31 [function] => course_render [args] => Array ( [0] => Array ( [course_code] => cl-ans [hr_nid] => 154869 [title] => Comprehensive C# and .NET Application Security [requirements] => [overview] =>

A number of programming languages are available today to compile code to .NET and ASP.NET frameworks. The environment provides powerful means for security development, but developers should know how to apply the architecture- and coding-level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation.

The aim of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from performing privileged actions, protect resources through strong authentication and authorization, provide remote procedure calls, handle sessions, introduce different implementations for certain functionality, and many more. A special section is devoted to configuration and hardening of the .NET and ASP.NET environment for security.

A brief introduction to the foundations of cryptography provides a common practical baseline for understanding the purpose and the operation of various algorithms, based on which the course presents the cryptographic features that can be used in .NET. This is followed by the introduction of some recent crypto vulnerabilities both related to certain crypto algorithms and cryptographic protocols, as well as side-channel attacks.

Introduction of different vulnerabilities starts with presenting some typical programming problems committed when using .NET, including bug categories of input validation, error handling or race conditions. A special focus is given to XML security, while the topic of ASP.NET-specific vulnerabilities tackles some special issues and attack methods: like attacking the ViewState, or the string termination attacks.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037228 [source_title] => Comprehensive C# and .NET Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) ) [1] => Array ( [0] => stdClass Object ( [tid] => 1377 [alias] => secure-code-training [name] => Secure Code [english_name] => Secure Code [consulting_option] => available ) ) [2] => cl-ans [3] => Array ( [outlines] => Array ( [appsecdev] => stdClass Object ( [course_code] => appsecdev [hr_nid] => 310959 [title] => Application Security for Developers [requirements] =>

Basics of any programming language    
Experience in developing applications

[overview] =>

This course will help professionals understand the value and limits of Application Security. While the Application Security Principals provides valuable awareness around some of the major risks in applications today, this course will highlight both the good and not so good.

This course is crucial because of the increasing need for developers to code in a secure manner. It is critical to introduce security as a quality component into the development cycle. This course aims at educating developers about various security vulnerabilities through hands-on practice using our purposely developed insecure web application.

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037503 [source_title] => Application Security for Developers [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => appsecdev ) [cl-and] => stdClass Object ( [course_code] => cl-and [hr_nid] => 154993 [title] => Android Security [requirements] => [overview] =>

Android is an open platform for mobile devices such as handsets and tablets. It has a large variety of security features to make developing secure software easier; however, it is also missing certain security aspects that are present in other hand-held platforms. The course gives a comprehensive overview of these features, and points out the most critical shortcomings to be aware of related to the underlying Linux, the file system and the environment in general, as well as regarding using permissions and other Android software development components.

Typical security pitfalls and vulnerabilities are described both for native code and Java applications, along with recommendations and best practices to avoid and mitigate them. In many cases discussed issues are supported with real-life examples and case studies. Finally, we give a brief overview on how to use security testing tools to reveal any security relevant programming bugs.

Participants attending this course will 

Audience

Professionals

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037231 [source_title] => Android Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-and ) [cl-anw] => stdClass Object ( [course_code] => cl-anw [hr_nid] => 155017 [title] => Network Security and Secure Communication [requirements] => [overview] =>

Implementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification and anonymity – is given, while also presenting the typical problems that may damage these requirements along with real-world solutions.

As a critical aspect of network security is cryptography, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical background, these elements are discussed from a developer's perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.

Typical crypto vulnerabilities are discussed both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.

Finally, as XML technology is central for data exchange by networked applications, the security aspects of XML are described. This includes the usage of XML within web services and SOAP messages alongside protection measures such as XML signature and XML encryption – as well as weaknesses in those protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.

Participants attending this course will

Audience

Developers, Professionals

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037232 [source_title] => Network Security and Secure Communication [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-anw ) [cl-cjw] => stdClass Object ( [course_code] => cl-cjw [hr_nid] => 154909 [title] => Combined C/C++, JAVA and Web Application Security [requirements] => [overview] =>

To serve in the best way heterogeneous development groups that are using various platforms simultaneously during their everyday work, we have merged various topics into a combined course that presents diverse secure coding subjects in didactic manner on a single training event. This course combines C/C++ and Java platform security to provide an extensive, cross-platform secure coding expertise.

Concerning C/C++, common security vulnerabilities are discussed, backed by practical exercises about the attacking methods that exploit these vulnerabilities, with the focus on the mitigation techniques that can be applied to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation.

Security components and service of Java are discussed by presenting the different APIs and tools through a number of practical exercises where participants can gain hands-on experience in using them. The course also covers security issues of web services and the related Java services that can be applied to prevent the most aching threats of the Internet based services. Finally, web- and Java-related security vulnerabilities are demonstrated by easy-to-understand exercises, which not only show the root cause of the problems, but also demonstrate the attack methods along with the recommended mitigation and coding techniques in order to avoid the associated security problems.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 28 [status] => published [changed] => 1700037230 [source_title] => Combined C/C++, JAVA and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-cjw ) [cl-cls] => stdClass Object ( [course_code] => cl-cls [hr_nid] => 155009 [title] => Application Security in the Cloud [requirements] => [overview] =>

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. Opinions, however, diverge many times even on defining who is responsible for ensuring the security of cloud resources.

Covering IaaS, PaaS and SaaS, first the security of the infrastructure is discussed: hardening and configuration issues as well as various solutions for authentication and authorization alongside identity management that should be at the core of all security architecture. This is followed by some basics regarding legal and contractual issues, namely how trust is established and governed in the cloud.

The journey through cloud security continues with understanding cloud-specific threats and the attackers’ goals and motivations as well as typical attack steps taken against cloud solutions. Special focus is also given to auditing the cloud and providing security evaluation of cloud solutions on all levels, including penetration testing and vulnerability analysis.

The focus of the course is on application security issues, dealing both with data security and the security of the applications themselves. From the standpoint of application security, cloud computing security is not substantially different from general software security, and therefore basically all OWASP-enlisted vulnerabilities are relevant in this domain as well. It is the set of threats and risks that makes the difference, and thus the training is concluded with the enumeration of various cloud-specific attack vectors connected to the weaknesses discussed beforehand.

Participants attending this course will

Audience

Developers, Managers, Professionals

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037232 [source_title] => Application Security in the Cloud [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-cls ) [cl-csc] => stdClass Object ( [course_code] => cl-csc [hr_nid] => 154749 [title] => C/C++ Secure Coding [requirements] =>

Basics of C/C++

[overview] =>

This three day course covers the basics of securing the C/C++ code against the malicious users who may exploit many vulnerabilities in the code with memory management and input handling, the course cover the principals of writing secure code.

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037227 [source_title] => C/C++ Secure Coding [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-csc ) [cl-jad] => stdClass Object ( [course_code] => cl-jad [hr_nid] => 154849 [title] => Advanced Java Security [requirements] => [overview] =>

Even experienced Java programmers are not mastering by all means the various security services offered by Java, and are likewise not aware of the different vulnerabilities that are relevant for web applications written in Java.

The course – besides introducing security components of Standard Java Edition – deals with security issues of Java Enterprise Edition (JEE) and web services. Discussion of specific services is preceded with the foundations of cryptography and secure communication. Various exercises deal with declarative and programmatic security techniques in JEE, while both transport-layer and end-to-end security of web services is discussed. The use of all components is presented through several practical exercises, where participants can try out the discussed APIs and tools for themselves.

The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform and web-related vulnerabilities. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1707138583 [source_title] => Advanced Java Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jad ) [cl-jpw] => stdClass Object ( [course_code] => cl-jpw [hr_nid] => 154917 [title] => Combined JAVA, PHP and Web Application Security [requirements] => [overview] =>

Even experienced programmers do not master by all means the various security services offered by their development platforms, and are likewise not aware of the different vulnerabilities that are relevant for their developments. This course targets developers using both Java and PHP, providing them essential skills necessary to make their applications resistant to contemporary attacks through the Internet.

Levels of Java security architecture are walked through by tackling access control, authentication and authorization, secure communication and various cryptographic functions. Various APIs are also introduced that can be used to secure your code in PHP, like OpenSSL for cryptography or HTML Purifier for input validation. On server side, the best practices are given for hardening and configuring the operating system, the web container, the file system, the SQL server and the PHP itself, while a special focus is given to client-side security through security issues of JavaScript, Ajax and HTML5.

General web vulnerabilities are discussed by examples aligned to the OWASP Top Ten, showing various injection attacks, script injections, attacks against session handling, insecure direct object references, issues with file uploads, and many others. The various Java- and PHP-specific language problems and issues stemming from the runtime environment are introduced grouped into the standard vulnerability types of missing or improper input validation, improper use of security features, incorrect error and exception handling, time- and state-related problems, code quality issues and mobile code-related vulnerabilities.

Participants can try out the discussed APIs, tools and the effects of configurations for themselves, while the introduction of vulnerabilities are all supported by a number of hands-on exercises demonstrating the consequences of successful attacks, showing how to correct the bugs and apply mitigation techniques, and introducing the use of various extensions and tools.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 28 [status] => published [changed] => 1700037231 [source_title] => Combined JAVA, PHP and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jpw ) [cl-jsc] => stdClass Object ( [course_code] => cl-jsc [hr_nid] => 154753 [title] => Standard Java Security [requirements] => [overview] =>

Description

The Java language and the Runtime Environment (JRE) was designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++. Yet, software developers and architects should not only know how to use the various security features of the Java environment (positive security), but should also be aware of the numerous vulnerabilities that are still relevant for Java development (negative security).

The introduction of security services is preceded with a brief overview of the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of these components is presented through several practical exercises, where participants can try out the discussed APIs for themselves.

The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform, covering both the typical bugs committed by Java programmers and the language- and environment-specific issues. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037227 [source_title] => Standard Java Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jsc ) [cl-jwa] => stdClass Object ( [course_code] => cl-jwa [hr_nid] => 154757 [title] => Java and Web Application Security [requirements] => [overview] =>

Description

Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are relevant for web applications written in Java, and the consequences of the various risks.

General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of Java with the most important aim to avoid the associated problems. In addition, a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

The course introduces security components of Standard Java Edition, which is preceded with the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of all components is presented through practical exercises, where participants can try out the discussed APIs and tools for themselves.

Finally, the course explains the most frequent and severe programming flaws of the Java language and platform. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037227 [source_title] => Java and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jwa ) [cl-jwe] => stdClass Object ( [course_code] => cl-jwe [hr_nid] => 154853 [title] => Advanced Java, JEE and Web Application Security [requirements] => [overview] =>

Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are relevant for web applications written in Java, and the consequences of the various risks.

General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of Java with the most important aim to avoid the associated problems. In addition, a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

The course introduces security components of Standard Java Edition, which is preceded with the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. Security issues of Java Enterprise Edition are presented through various exercises explaining both declarative and programmatic security techniques in JEE.

Finally, the course explains the most frequent and severe programming flaws of the Java language and platform. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 28 [status] => published [changed] => 1700037228 [source_title] => Advanced Java, JEE and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jwe ) [cl-njs] => stdClass Object ( [course_code] => cl-njs [hr_nid] => 200321 [title] => Node.JS and Web Application Security [requirements] =>

Basic Web application development

[overview] =>

As a developer, your duty is to write bulletproof code.

What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?

This Web application security course will change the way you look at code. A hands-on training during which we will teach you all the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.

It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

Delegates attending will:

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037257 [source_title] => Node.JS and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-njs ) [cl-nsc] => stdClass Object ( [course_code] => cl-nsc [hr_nid] => 154857 [title] => .NET, C# and ASP.NET Security Development [requirements] => [overview] =>

A number of programming languages are available today to compile code to .NET and ASP.NET frameworks. The environment provides powerful means for security development, but developers should know how to apply the architecture- and coding-level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation.

The aim of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from performing privileged actions, protect resources through strong authentication and authorization, provide remote procedure calls, handle sessions, introduce different implementations for certain functionality, and many more.

Introduction of different vulnerabilities starts with presenting some typical programming problems committed when using .NET, while the discussion of vulnerabilities of the ASP.NET also deals with various environment settings and their effects. Finally, the topic of ASP.NET-specific vulnerabilities not only deals with some general web application security challenges, but also with special issues and attack methods like attacking the ViewState, or the string termination attacks.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037228 [source_title] => .NET, C# and ASP.NET Security Development [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-nsc ) [cl-nwa] => stdClass Object ( [course_code] => cl-nwa [hr_nid] => 154873 [title] => Advanced C#, ASP.NET and Web Application Security [requirements] => [overview] =>

Beyond solid knowledge in using various security features of .NET and ASP.NET, even for experienced programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side along with the consequences of the various risks.

In this course the general web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of ASP.NET. A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

The course also deals with the security architecture and components of the .NET framework, including code- and role based access control, permission declaration and checking mechanisms and the transparency model. A brief introduction to the foundations of cryptography provides a common practical baseline for understanding the purpose and the operation of various algorithms, based on which the course presents the cryptographic features that can be used in .NET.

Introduction of different security bugs follows the well-established vulnerability categories, tackling input validation, security features, error handling, time- and state-related problems, the group of general code quality issues, and a special section on ASP.NET-specific vulnerabilities. These topics are concluded with an overview on testing tools that can be used to automatically reveal some of the learnt bugs.

Topics are presented through practical exercises where participants can try out the consequences of certain vulnerabilities, the mitigations, as well as the discussed APIs and tools for themselves.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037229 [source_title] => Advanced C#, ASP.NET and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-nwa ) [cl-osc] => stdClass Object ( [course_code] => cl-osc [hr_nid] => 155025 [title] => The Secure Coding Landscape [requirements] => [overview] =>

The course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code.

Participants attending this course will 

Audience

Managers

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037233 [source_title] => The Secure Coding Landscape [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-osc ) ) [codes] => Array ( [0] => appsecdev [1] => cl-and [2] => cl-anw [3] => cl-cjw [4] => cl-cls [5] => cl-csc [6] => cl-jad [7] => cl-jpw [8] => cl-jsc [9] => cl-jwa [10] => cl-jwe [11] => cl-njs [12] => cl-nsc [13] => cl-nwa [14] => cl-osc ) ) [4] => Array ( [regions] => Array ( [ec_4966] => Array ( [tid] => ec_4966 [title] => Guayaquil [sales_area] => ec_ecuador [venues] => Array ( [ec_15661446] => Array ( [vid] => ec_15661446 [title] => Guayaquil - Mall del Sol [vfdc] => 175.00 [prices] => Array ( [1] => Array ( [remote guaranteed] => 7937 [classroom guaranteed] => 8462 [remote guaranteed per delegate] => 7937 [delegates] => 1 [adp] => 1237 [classroom guaranteed per delegate] => 8462 ) [2] => Array ( [remote guaranteed] => 9174 [classroom guaranteed] => 9880 [remote guaranteed per delegate] => 4587 [delegates] => 2 [adp] => 1237 [classroom guaranteed per delegate] => 4940 ) [3] => Array ( [remote guaranteed] => 10410 [classroom guaranteed] => 11295 [remote guaranteed per delegate] => 3470 [delegates] => 3 [adp] => 1237 [classroom guaranteed per delegate] => 3765 ) [4] => Array ( [remote guaranteed] => 11648 [classroom guaranteed] => 12712 [remote guaranteed per delegate] => 2912 [delegates] => 4 [adp] => 1237 [classroom guaranteed per delegate] => 3178 ) [5] => Array ( [remote guaranteed] => 12885 [classroom guaranteed] => 14130 [remote guaranteed per delegate] => 2577 [delegates] => 5 [adp] => 1237 [classroom guaranteed per delegate] => 2826 ) [6] => Array ( [remote guaranteed] => 14124 [classroom guaranteed] => 15546 [remote guaranteed per delegate] => 2354 [delegates] => 6 [adp] => 1237 [classroom guaranteed per delegate] => 2591 ) [7] => Array ( [remote guaranteed] => 15358 [classroom guaranteed] => 16961 [remote guaranteed per delegate] => 2194 [delegates] => 7 [adp] => 1237 [classroom guaranteed per delegate] => 2423 ) [8] => Array ( [remote guaranteed] => 16600 [classroom guaranteed] => 18384 [remote guaranteed per delegate] => 2075 [delegates] => 8 [adp] => 1237 [classroom guaranteed per delegate] => 2298 ) [9] => Array ( [remote guaranteed] => 17829 [classroom guaranteed] => 19800 [remote guaranteed per delegate] => 1981 [delegates] => 9 [adp] => 1237 [classroom guaranteed per delegate] => 2200 ) [10] => Array ( [remote guaranteed] => 19070 [classroom guaranteed] => 21220 [remote guaranteed per delegate] => 1907 [delegates] => 10 [adp] => 1237 [classroom guaranteed per delegate] => 2122 ) ) ) ) ) [ec_4967] => Array ( [tid] => ec_4967 [title] => Quito [sales_area] => ec_ecuador [venues] => Array ( [ec_15661447] => Array ( [vid] => ec_15661447 [title] => Quito - Av Eloy Alfaro [vfdc] => 200.00 [prices] => Array ( [1] => Array ( [remote guaranteed] => 7937 [classroom guaranteed] => 8537 [remote guaranteed per delegate] => 7937 [delegates] => 1 [adp] => 1237 [classroom guaranteed per delegate] => 8537 ) [2] => Array ( [remote guaranteed] => 9174 [classroom guaranteed] => 9924 [remote guaranteed per delegate] => 4587 [delegates] => 2 [adp] => 1237 [classroom guaranteed per delegate] => 4962 ) [3] => Array ( [remote guaranteed] => 10410 [classroom guaranteed] => 11310 [remote guaranteed per delegate] => 3470 [delegates] => 3 [adp] => 1237 [classroom guaranteed per delegate] => 3770 ) [4] => Array ( [remote guaranteed] => 11648 [classroom guaranteed] => 12700 [remote guaranteed per delegate] => 2912 [delegates] => 4 [adp] => 1237 [classroom guaranteed per delegate] => 3175 ) [5] => Array ( [remote guaranteed] => 12885 [classroom guaranteed] => 14085 [remote guaranteed per delegate] => 2577 [delegates] => 5 [adp] => 1237 [classroom guaranteed per delegate] => 2817 ) [6] => Array ( [remote guaranteed] => 14124 [classroom guaranteed] => 15474 [remote guaranteed per delegate] => 2354 [delegates] => 6 [adp] => 1237 [classroom guaranteed per delegate] => 2579 ) [7] => Array ( [remote guaranteed] => 15358 [classroom guaranteed] => 16856 [remote guaranteed per delegate] => 2194 [delegates] => 7 [adp] => 1237 [classroom guaranteed per delegate] => 2408 ) [8] => Array ( [remote guaranteed] => 16600 [classroom guaranteed] => 18248 [remote guaranteed per delegate] => 2075 [delegates] => 8 [adp] => 1237 [classroom guaranteed per delegate] => 2281 ) [9] => Array ( [remote guaranteed] => 17829 [classroom guaranteed] => 19629 [remote guaranteed per delegate] => 1981 [delegates] => 9 [adp] => 1237 [classroom guaranteed per delegate] => 2181 ) [10] => Array ( [remote guaranteed] => 19070 [classroom guaranteed] => 21020 [remote guaranteed per delegate] => 1907 [delegates] => 10 [adp] => 1237 [classroom guaranteed per delegate] => 2102 ) ) ) ) ) ) [remote] => Array ( [1] => Array ( [remote guaranteed] => 7937 [remote guaranteed per delegate] => 7937 [adp] => 1237 ) [2] => Array ( [remote guaranteed] => 9174 [remote guaranteed per delegate] => 4587 [adp] => 1237 ) [3] => Array ( [remote guaranteed] => 10410 [remote guaranteed per delegate] => 3470 [adp] => 1237 ) [4] => Array ( [remote guaranteed] => 11648 [remote guaranteed per delegate] => 2912 [adp] => 1237 ) [5] => Array ( [remote guaranteed] => 12885 [remote guaranteed per delegate] => 2577 [adp] => 1237 ) [6] => Array ( [remote guaranteed] => 14124 [remote guaranteed per delegate] => 2354 [adp] => 1237 ) [7] => Array ( [remote guaranteed] => 15358 [remote guaranteed per delegate] => 2194 [adp] => 1237 ) [8] => Array ( [remote guaranteed] => 16600 [remote guaranteed per delegate] => 2075 [adp] => 1237 ) [9] => Array ( [remote guaranteed] => 17829 [remote guaranteed per delegate] => 1981 [adp] => 1237 ) [10] => Array ( [remote guaranteed] => 19070 [remote guaranteed per delegate] => 1907 [adp] => 1237 ) ) [currency] => USD ) [5] => Array ( [0] => 5 ) [6] => Array ( [422727] => Array ( [title] => Comprehensive C# and .NET Application Security [rating] => 5 [delegate_and_company] => Alma Xocua - PASE, Servicios Electrónicos S.A. de C.V. [body] => Me gustó ver desarrollo seguro en ASP.NEt pero hicieron falta ejercicios práticos para implementar en el dia a dia de los desarrolladores [mc] => [is_mt] => 0 [nid] => 422727 ) ) [7] => 5 [8] => 1 [9] => 1 [10] => ) ) [7] => Array ( [file] => /apps/nobleprog-website/core/routes.php [line] => 19 [function] => course_menu_callback [args] => Array ( [0] => /en/cc/cl-ans ) ) [8] => Array ( [file] => /apps/nobleprog-website/__index.php [line] => 100 [args] => Array ( [0] => /apps/nobleprog-website/core/routes.php ) [function] => require_once ) [9] => Array ( [file] => /apps/nobleprog-website/_index.php [line] => 26 [args] => Array ( [0] => /apps/nobleprog-website/__index.php ) [function] => include_once ) [10] => Array ( [file] => /apps/hitra7/index.php [line] => 54 [args] => Array ( [0] => /apps/nobleprog-website/_index.php ) [function] => include_once ) ) NP URI: www.nobleprog.com.ec/en/cc/cl-ans Undefined array key "devel_domain" /apps/nobleprog-website/includes/functions/new-modules-general-functions.php:82 Array ( [0] => Array ( [file] => /apps/nobleprog-website/includes/functions/new-modules-general-functions.php [line] => 82 [function] => myErrorHandler [args] => Array ( [0] => 2 [1] => Undefined array key "devel_domain" [2] => /apps/nobleprog-website/includes/functions/new-modules-general-functions.php [3] => 82 ) ) [1] => Array ( [file] => /apps/hitra7/drupal7/sites/all/modules/_custom/frontend/islc7/islc7.module [line] => 99 [function] => variable_get [args] => Array ( [0] => devel_domain [1] => ) ) [2] => Array ( [file] => /apps/hitra7/drupal7/sites/all/modules/_custom/frontend/islc7/islc7_block.inc [line] => 34 [function] => islc_get_site_list [args] => Array ( ) ) [3] => Array ( [file] => /apps/nobleprog-website/nptemplates/default.php [line] => 265 [function] => islc7_sites_links_array_v3 [args] => Array ( ) ) [4] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 85 [args] => Array ( [0] => /apps/nobleprog-website/nptemplates/default.php ) [function] => require_once ) [5] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 31 [function] => course_render [args] => Array ( [0] => Array ( [course_code] => cl-ans [hr_nid] => 154869 [title] => Comprehensive C# and .NET Application Security [requirements] => [overview] =>

A number of programming languages are available today to compile code to .NET and ASP.NET frameworks. The environment provides powerful means for security development, but developers should know how to apply the architecture- and coding-level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation.

The aim of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from performing privileged actions, protect resources through strong authentication and authorization, provide remote procedure calls, handle sessions, introduce different implementations for certain functionality, and many more. A special section is devoted to configuration and hardening of the .NET and ASP.NET environment for security.

A brief introduction to the foundations of cryptography provides a common practical baseline for understanding the purpose and the operation of various algorithms, based on which the course presents the cryptographic features that can be used in .NET. This is followed by the introduction of some recent crypto vulnerabilities both related to certain crypto algorithms and cryptographic protocols, as well as side-channel attacks.

Introduction of different vulnerabilities starts with presenting some typical programming problems committed when using .NET, including bug categories of input validation, error handling or race conditions. A special focus is given to XML security, while the topic of ASP.NET-specific vulnerabilities tackles some special issues and attack methods: like attacking the ViewState, or the string termination attacks.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037228 [source_title] => Comprehensive C# and .NET Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) ) [1] => Array ( [0] => stdClass Object ( [tid] => 1377 [alias] => secure-code-training [name] => Secure Code [english_name] => Secure Code [consulting_option] => available ) ) [2] => cl-ans [3] => Array ( [outlines] => Array ( [appsecdev] => stdClass Object ( [course_code] => appsecdev [hr_nid] => 310959 [title] => Application Security for Developers [requirements] =>

Basics of any programming language    
Experience in developing applications

[overview] =>

This course will help professionals understand the value and limits of Application Security. While the Application Security Principals provides valuable awareness around some of the major risks in applications today, this course will highlight both the good and not so good.

This course is crucial because of the increasing need for developers to code in a secure manner. It is critical to introduce security as a quality component into the development cycle. This course aims at educating developers about various security vulnerabilities through hands-on practice using our purposely developed insecure web application.

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037503 [source_title] => Application Security for Developers [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => appsecdev ) [cl-and] => stdClass Object ( [course_code] => cl-and [hr_nid] => 154993 [title] => Android Security [requirements] => [overview] =>

Android is an open platform for mobile devices such as handsets and tablets. It has a large variety of security features to make developing secure software easier; however, it is also missing certain security aspects that are present in other hand-held platforms. The course gives a comprehensive overview of these features, and points out the most critical shortcomings to be aware of related to the underlying Linux, the file system and the environment in general, as well as regarding using permissions and other Android software development components.

Typical security pitfalls and vulnerabilities are described both for native code and Java applications, along with recommendations and best practices to avoid and mitigate them. In many cases discussed issues are supported with real-life examples and case studies. Finally, we give a brief overview on how to use security testing tools to reveal any security relevant programming bugs.

Participants attending this course will 

Audience

Professionals

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037231 [source_title] => Android Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-and ) [cl-anw] => stdClass Object ( [course_code] => cl-anw [hr_nid] => 155017 [title] => Network Security and Secure Communication [requirements] => [overview] =>

Implementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification and anonymity – is given, while also presenting the typical problems that may damage these requirements along with real-world solutions.

As a critical aspect of network security is cryptography, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical background, these elements are discussed from a developer's perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.

Typical crypto vulnerabilities are discussed both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.

Finally, as XML technology is central for data exchange by networked applications, the security aspects of XML are described. This includes the usage of XML within web services and SOAP messages alongside protection measures such as XML signature and XML encryption – as well as weaknesses in those protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.

Participants attending this course will

Audience

Developers, Professionals

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037232 [source_title] => Network Security and Secure Communication [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-anw ) [cl-cjw] => stdClass Object ( [course_code] => cl-cjw [hr_nid] => 154909 [title] => Combined C/C++, JAVA and Web Application Security [requirements] => [overview] =>

To serve in the best way heterogeneous development groups that are using various platforms simultaneously during their everyday work, we have merged various topics into a combined course that presents diverse secure coding subjects in didactic manner on a single training event. This course combines C/C++ and Java platform security to provide an extensive, cross-platform secure coding expertise.

Concerning C/C++, common security vulnerabilities are discussed, backed by practical exercises about the attacking methods that exploit these vulnerabilities, with the focus on the mitigation techniques that can be applied to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation.

Security components and service of Java are discussed by presenting the different APIs and tools through a number of practical exercises where participants can gain hands-on experience in using them. The course also covers security issues of web services and the related Java services that can be applied to prevent the most aching threats of the Internet based services. Finally, web- and Java-related security vulnerabilities are demonstrated by easy-to-understand exercises, which not only show the root cause of the problems, but also demonstrate the attack methods along with the recommended mitigation and coding techniques in order to avoid the associated security problems.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 28 [status] => published [changed] => 1700037230 [source_title] => Combined C/C++, JAVA and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-cjw ) [cl-cls] => stdClass Object ( [course_code] => cl-cls [hr_nid] => 155009 [title] => Application Security in the Cloud [requirements] => [overview] =>

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. Opinions, however, diverge many times even on defining who is responsible for ensuring the security of cloud resources.

Covering IaaS, PaaS and SaaS, first the security of the infrastructure is discussed: hardening and configuration issues as well as various solutions for authentication and authorization alongside identity management that should be at the core of all security architecture. This is followed by some basics regarding legal and contractual issues, namely how trust is established and governed in the cloud.

The journey through cloud security continues with understanding cloud-specific threats and the attackers’ goals and motivations as well as typical attack steps taken against cloud solutions. Special focus is also given to auditing the cloud and providing security evaluation of cloud solutions on all levels, including penetration testing and vulnerability analysis.

The focus of the course is on application security issues, dealing both with data security and the security of the applications themselves. From the standpoint of application security, cloud computing security is not substantially different from general software security, and therefore basically all OWASP-enlisted vulnerabilities are relevant in this domain as well. It is the set of threats and risks that makes the difference, and thus the training is concluded with the enumeration of various cloud-specific attack vectors connected to the weaknesses discussed beforehand.

Participants attending this course will

Audience

Developers, Managers, Professionals

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037232 [source_title] => Application Security in the Cloud [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-cls ) [cl-csc] => stdClass Object ( [course_code] => cl-csc [hr_nid] => 154749 [title] => C/C++ Secure Coding [requirements] =>

Basics of C/C++

[overview] =>

This three day course covers the basics of securing the C/C++ code against the malicious users who may exploit many vulnerabilities in the code with memory management and input handling, the course cover the principals of writing secure code.

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037227 [source_title] => C/C++ Secure Coding [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-csc ) [cl-jad] => stdClass Object ( [course_code] => cl-jad [hr_nid] => 154849 [title] => Advanced Java Security [requirements] => [overview] =>

Even experienced Java programmers are not mastering by all means the various security services offered by Java, and are likewise not aware of the different vulnerabilities that are relevant for web applications written in Java.

The course – besides introducing security components of Standard Java Edition – deals with security issues of Java Enterprise Edition (JEE) and web services. Discussion of specific services is preceded with the foundations of cryptography and secure communication. Various exercises deal with declarative and programmatic security techniques in JEE, while both transport-layer and end-to-end security of web services is discussed. The use of all components is presented through several practical exercises, where participants can try out the discussed APIs and tools for themselves.

The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform and web-related vulnerabilities. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1707138583 [source_title] => Advanced Java Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jad ) [cl-jpw] => stdClass Object ( [course_code] => cl-jpw [hr_nid] => 154917 [title] => Combined JAVA, PHP and Web Application Security [requirements] => [overview] =>

Even experienced programmers do not master by all means the various security services offered by their development platforms, and are likewise not aware of the different vulnerabilities that are relevant for their developments. This course targets developers using both Java and PHP, providing them essential skills necessary to make their applications resistant to contemporary attacks through the Internet.

Levels of Java security architecture are walked through by tackling access control, authentication and authorization, secure communication and various cryptographic functions. Various APIs are also introduced that can be used to secure your code in PHP, like OpenSSL for cryptography or HTML Purifier for input validation. On server side, the best practices are given for hardening and configuring the operating system, the web container, the file system, the SQL server and the PHP itself, while a special focus is given to client-side security through security issues of JavaScript, Ajax and HTML5.

General web vulnerabilities are discussed by examples aligned to the OWASP Top Ten, showing various injection attacks, script injections, attacks against session handling, insecure direct object references, issues with file uploads, and many others. The various Java- and PHP-specific language problems and issues stemming from the runtime environment are introduced grouped into the standard vulnerability types of missing or improper input validation, improper use of security features, incorrect error and exception handling, time- and state-related problems, code quality issues and mobile code-related vulnerabilities.

Participants can try out the discussed APIs, tools and the effects of configurations for themselves, while the introduction of vulnerabilities are all supported by a number of hands-on exercises demonstrating the consequences of successful attacks, showing how to correct the bugs and apply mitigation techniques, and introducing the use of various extensions and tools.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 28 [status] => published [changed] => 1700037231 [source_title] => Combined JAVA, PHP and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jpw ) [cl-jsc] => stdClass Object ( [course_code] => cl-jsc [hr_nid] => 154753 [title] => Standard Java Security [requirements] => [overview] =>

Description

The Java language and the Runtime Environment (JRE) was designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++. Yet, software developers and architects should not only know how to use the various security features of the Java environment (positive security), but should also be aware of the numerous vulnerabilities that are still relevant for Java development (negative security).

The introduction of security services is preceded with a brief overview of the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of these components is presented through several practical exercises, where participants can try out the discussed APIs for themselves.

The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform, covering both the typical bugs committed by Java programmers and the language- and environment-specific issues. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037227 [source_title] => Standard Java Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jsc ) [cl-jwa] => stdClass Object ( [course_code] => cl-jwa [hr_nid] => 154757 [title] => Java and Web Application Security [requirements] => [overview] =>

Description

Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are relevant for web applications written in Java, and the consequences of the various risks.

General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of Java with the most important aim to avoid the associated problems. In addition, a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

The course introduces security components of Standard Java Edition, which is preceded with the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of all components is presented through practical exercises, where participants can try out the discussed APIs and tools for themselves.

Finally, the course explains the most frequent and severe programming flaws of the Java language and platform. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037227 [source_title] => Java and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jwa ) [cl-jwe] => stdClass Object ( [course_code] => cl-jwe [hr_nid] => 154853 [title] => Advanced Java, JEE and Web Application Security [requirements] => [overview] =>

Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are relevant for web applications written in Java, and the consequences of the various risks.

General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of Java with the most important aim to avoid the associated problems. In addition, a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

The course introduces security components of Standard Java Edition, which is preceded with the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. Security issues of Java Enterprise Edition are presented through various exercises explaining both declarative and programmatic security techniques in JEE.

Finally, the course explains the most frequent and severe programming flaws of the Java language and platform. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 28 [status] => published [changed] => 1700037228 [source_title] => Advanced Java, JEE and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jwe ) [cl-njs] => stdClass Object ( [course_code] => cl-njs [hr_nid] => 200321 [title] => Node.JS and Web Application Security [requirements] =>

Basic Web application development

[overview] =>

As a developer, your duty is to write bulletproof code.

What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?

This Web application security course will change the way you look at code. A hands-on training during which we will teach you all the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.

It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

Delegates attending will:

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037257 [source_title] => Node.JS and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-njs ) [cl-nsc] => stdClass Object ( [course_code] => cl-nsc [hr_nid] => 154857 [title] => .NET, C# and ASP.NET Security Development [requirements] => [overview] =>

A number of programming languages are available today to compile code to .NET and ASP.NET frameworks. The environment provides powerful means for security development, but developers should know how to apply the architecture- and coding-level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation.

The aim of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from performing privileged actions, protect resources through strong authentication and authorization, provide remote procedure calls, handle sessions, introduce different implementations for certain functionality, and many more.

Introduction of different vulnerabilities starts with presenting some typical programming problems committed when using .NET, while the discussion of vulnerabilities of the ASP.NET also deals with various environment settings and their effects. Finally, the topic of ASP.NET-specific vulnerabilities not only deals with some general web application security challenges, but also with special issues and attack methods like attacking the ViewState, or the string termination attacks.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037228 [source_title] => .NET, C# and ASP.NET Security Development [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-nsc ) [cl-nwa] => stdClass Object ( [course_code] => cl-nwa [hr_nid] => 154873 [title] => Advanced C#, ASP.NET and Web Application Security [requirements] => [overview] =>

Beyond solid knowledge in using various security features of .NET and ASP.NET, even for experienced programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side along with the consequences of the various risks.

In this course the general web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of ASP.NET. A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

The course also deals with the security architecture and components of the .NET framework, including code- and role based access control, permission declaration and checking mechanisms and the transparency model. A brief introduction to the foundations of cryptography provides a common practical baseline for understanding the purpose and the operation of various algorithms, based on which the course presents the cryptographic features that can be used in .NET.

Introduction of different security bugs follows the well-established vulnerability categories, tackling input validation, security features, error handling, time- and state-related problems, the group of general code quality issues, and a special section on ASP.NET-specific vulnerabilities. These topics are concluded with an overview on testing tools that can be used to automatically reveal some of the learnt bugs.

Topics are presented through practical exercises where participants can try out the consequences of certain vulnerabilities, the mitigations, as well as the discussed APIs and tools for themselves.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037229 [source_title] => Advanced C#, ASP.NET and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-nwa ) [cl-osc] => stdClass Object ( [course_code] => cl-osc [hr_nid] => 155025 [title] => The Secure Coding Landscape [requirements] => [overview] =>

The course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code.

Participants attending this course will 

Audience

Managers

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037233 [source_title] => The Secure Coding Landscape [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-osc ) ) [codes] => Array ( [0] => appsecdev [1] => cl-and [2] => cl-anw [3] => cl-cjw [4] => cl-cls [5] => cl-csc [6] => cl-jad [7] => cl-jpw [8] => cl-jsc [9] => cl-jwa [10] => cl-jwe [11] => cl-njs [12] => cl-nsc [13] => cl-nwa [14] => cl-osc ) ) [4] => Array ( [regions] => Array ( [ec_4966] => Array ( [tid] => ec_4966 [title] => Guayaquil [sales_area] => ec_ecuador [venues] => Array ( [ec_15661446] => Array ( [vid] => ec_15661446 [title] => Guayaquil - Mall del Sol [vfdc] => 175.00 [prices] => Array ( [1] => Array ( [remote guaranteed] => 7937 [classroom guaranteed] => 8462 [remote guaranteed per delegate] => 7937 [delegates] => 1 [adp] => 1237 [classroom guaranteed per delegate] => 8462 ) [2] => Array ( [remote guaranteed] => 9174 [classroom guaranteed] => 9880 [remote guaranteed per delegate] => 4587 [delegates] => 2 [adp] => 1237 [classroom guaranteed per delegate] => 4940 ) [3] => Array ( [remote guaranteed] => 10410 [classroom guaranteed] => 11295 [remote guaranteed per delegate] => 3470 [delegates] => 3 [adp] => 1237 [classroom guaranteed per delegate] => 3765 ) [4] => Array ( [remote guaranteed] => 11648 [classroom guaranteed] => 12712 [remote guaranteed per delegate] => 2912 [delegates] => 4 [adp] => 1237 [classroom guaranteed per delegate] => 3178 ) [5] => Array ( [remote guaranteed] => 12885 [classroom guaranteed] => 14130 [remote guaranteed per delegate] => 2577 [delegates] => 5 [adp] => 1237 [classroom guaranteed per delegate] => 2826 ) [6] => Array ( [remote guaranteed] => 14124 [classroom guaranteed] => 15546 [remote guaranteed per delegate] => 2354 [delegates] => 6 [adp] => 1237 [classroom guaranteed per delegate] => 2591 ) [7] => Array ( [remote guaranteed] => 15358 [classroom guaranteed] => 16961 [remote guaranteed per delegate] => 2194 [delegates] => 7 [adp] => 1237 [classroom guaranteed per delegate] => 2423 ) [8] => Array ( [remote guaranteed] => 16600 [classroom guaranteed] => 18384 [remote guaranteed per delegate] => 2075 [delegates] => 8 [adp] => 1237 [classroom guaranteed per delegate] => 2298 ) [9] => Array ( [remote guaranteed] => 17829 [classroom guaranteed] => 19800 [remote guaranteed per delegate] => 1981 [delegates] => 9 [adp] => 1237 [classroom guaranteed per delegate] => 2200 ) [10] => Array ( [remote guaranteed] => 19070 [classroom guaranteed] => 21220 [remote guaranteed per delegate] => 1907 [delegates] => 10 [adp] => 1237 [classroom guaranteed per delegate] => 2122 ) ) ) ) ) [ec_4967] => Array ( [tid] => ec_4967 [title] => Quito [sales_area] => ec_ecuador [venues] => Array ( [ec_15661447] => Array ( [vid] => ec_15661447 [title] => Quito - Av Eloy Alfaro [vfdc] => 200.00 [prices] => Array ( [1] => Array ( [remote guaranteed] => 7937 [classroom guaranteed] => 8537 [remote guaranteed per delegate] => 7937 [delegates] => 1 [adp] => 1237 [classroom guaranteed per delegate] => 8537 ) [2] => Array ( [remote guaranteed] => 9174 [classroom guaranteed] => 9924 [remote guaranteed per delegate] => 4587 [delegates] => 2 [adp] => 1237 [classroom guaranteed per delegate] => 4962 ) [3] => Array ( [remote guaranteed] => 10410 [classroom guaranteed] => 11310 [remote guaranteed per delegate] => 3470 [delegates] => 3 [adp] => 1237 [classroom guaranteed per delegate] => 3770 ) [4] => Array ( [remote guaranteed] => 11648 [classroom guaranteed] => 12700 [remote guaranteed per delegate] => 2912 [delegates] => 4 [adp] => 1237 [classroom guaranteed per delegate] => 3175 ) [5] => Array ( [remote guaranteed] => 12885 [classroom guaranteed] => 14085 [remote guaranteed per delegate] => 2577 [delegates] => 5 [adp] => 1237 [classroom guaranteed per delegate] => 2817 ) [6] => Array ( [remote guaranteed] => 14124 [classroom guaranteed] => 15474 [remote guaranteed per delegate] => 2354 [delegates] => 6 [adp] => 1237 [classroom guaranteed per delegate] => 2579 ) [7] => Array ( [remote guaranteed] => 15358 [classroom guaranteed] => 16856 [remote guaranteed per delegate] => 2194 [delegates] => 7 [adp] => 1237 [classroom guaranteed per delegate] => 2408 ) [8] => Array ( [remote guaranteed] => 16600 [classroom guaranteed] => 18248 [remote guaranteed per delegate] => 2075 [delegates] => 8 [adp] => 1237 [classroom guaranteed per delegate] => 2281 ) [9] => Array ( [remote guaranteed] => 17829 [classroom guaranteed] => 19629 [remote guaranteed per delegate] => 1981 [delegates] => 9 [adp] => 1237 [classroom guaranteed per delegate] => 2181 ) [10] => Array ( [remote guaranteed] => 19070 [classroom guaranteed] => 21020 [remote guaranteed per delegate] => 1907 [delegates] => 10 [adp] => 1237 [classroom guaranteed per delegate] => 2102 ) ) ) ) ) ) [remote] => Array ( [1] => Array ( [remote guaranteed] => 7937 [remote guaranteed per delegate] => 7937 [adp] => 1237 ) [2] => Array ( [remote guaranteed] => 9174 [remote guaranteed per delegate] => 4587 [adp] => 1237 ) [3] => Array ( [remote guaranteed] => 10410 [remote guaranteed per delegate] => 3470 [adp] => 1237 ) [4] => Array ( [remote guaranteed] => 11648 [remote guaranteed per delegate] => 2912 [adp] => 1237 ) [5] => Array ( [remote guaranteed] => 12885 [remote guaranteed per delegate] => 2577 [adp] => 1237 ) [6] => Array ( [remote guaranteed] => 14124 [remote guaranteed per delegate] => 2354 [adp] => 1237 ) [7] => Array ( [remote guaranteed] => 15358 [remote guaranteed per delegate] => 2194 [adp] => 1237 ) [8] => Array ( [remote guaranteed] => 16600 [remote guaranteed per delegate] => 2075 [adp] => 1237 ) [9] => Array ( [remote guaranteed] => 17829 [remote guaranteed per delegate] => 1981 [adp] => 1237 ) [10] => Array ( [remote guaranteed] => 19070 [remote guaranteed per delegate] => 1907 [adp] => 1237 ) ) [currency] => USD ) [5] => Array ( [0] => 5 ) [6] => Array ( [422727] => Array ( [title] => Comprehensive C# and .NET Application Security [rating] => 5 [delegate_and_company] => Alma Xocua - PASE, Servicios Electrónicos S.A. de C.V. [body] => Me gustó ver desarrollo seguro en ASP.NEt pero hicieron falta ejercicios práticos para implementar en el dia a dia de los desarrolladores [mc] => [is_mt] => 0 [nid] => 422727 ) ) [7] => 5 [8] => 1 [9] => 1 [10] => ) ) [6] => Array ( [file] => /apps/nobleprog-website/core/routes.php [line] => 19 [function] => course_menu_callback [args] => Array ( [0] => /en/cc/cl-ans ) ) [7] => Array ( [file] => /apps/nobleprog-website/__index.php [line] => 100 [args] => Array ( [0] => /apps/nobleprog-website/core/routes.php ) [function] => require_once ) [8] => Array ( [file] => /apps/nobleprog-website/_index.php [line] => 26 [args] => Array ( [0] => /apps/nobleprog-website/__index.php ) [function] => include_once ) [9] => Array ( [file] => /apps/hitra7/index.php [line] => 54 [args] => Array ( [0] => /apps/nobleprog-website/_index.php ) [function] => include_once ) ) NP URI: www.nobleprog.com.ec/en/cc/cl-ans Undefined array key "nobleprog_site_production_url" /apps/nobleprog-website/includes/functions/new-modules-general-functions.php:82 Array ( [0] => Array ( [file] => /apps/nobleprog-website/includes/functions/new-modules-general-functions.php [line] => 82 [function] => myErrorHandler [args] => Array ( [0] => 2 [1] => Undefined array key "nobleprog_site_production_url" [2] => /apps/nobleprog-website/includes/functions/new-modules-general-functions.php [3] => 82 ) ) [1] => Array ( [file] => /apps/hitra7/drupal7/sites/all/modules/_custom/frontend/islc7/islc7.module [line] => 131 [function] => variable_get [args] => Array ( [0] => nobleprog_site_production_url ) ) [2] => Array ( [file] => /apps/hitra7/drupal7/sites/all/modules/_custom/frontend/islc7/islc7_block.inc [line] => 44 [function] => islc_get_current_site [args] => Array ( ) ) [3] => Array ( [file] => /apps/nobleprog-website/nptemplates/default.php [line] => 265 [function] => islc7_sites_links_array_v3 [args] => Array ( ) ) [4] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 85 [args] => Array ( [0] => /apps/nobleprog-website/nptemplates/default.php ) [function] => require_once ) [5] => Array ( [file] => /apps/nobleprog-website/modules/course/course.php [line] => 31 [function] => course_render [args] => Array ( [0] => Array ( [course_code] => cl-ans [hr_nid] => 154869 [title] => Comprehensive C# and .NET Application Security [requirements] => [overview] =>

A number of programming languages are available today to compile code to .NET and ASP.NET frameworks. The environment provides powerful means for security development, but developers should know how to apply the architecture- and coding-level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation.

The aim of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from performing privileged actions, protect resources through strong authentication and authorization, provide remote procedure calls, handle sessions, introduce different implementations for certain functionality, and many more. A special section is devoted to configuration and hardening of the .NET and ASP.NET environment for security.

A brief introduction to the foundations of cryptography provides a common practical baseline for understanding the purpose and the operation of various algorithms, based on which the course presents the cryptographic features that can be used in .NET. This is followed by the introduction of some recent crypto vulnerabilities both related to certain crypto algorithms and cryptographic protocols, as well as side-channel attacks.

Introduction of different vulnerabilities starts with presenting some typical programming problems committed when using .NET, including bug categories of input validation, error handling or race conditions. A special focus is given to XML security, while the topic of ASP.NET-specific vulnerabilities tackles some special issues and attack methods: like attacking the ViewState, or the string termination attacks.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037228 [source_title] => Comprehensive C# and .NET Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) ) [1] => Array ( [0] => stdClass Object ( [tid] => 1377 [alias] => secure-code-training [name] => Secure Code [english_name] => Secure Code [consulting_option] => available ) ) [2] => cl-ans [3] => Array ( [outlines] => Array ( [appsecdev] => stdClass Object ( [course_code] => appsecdev [hr_nid] => 310959 [title] => Application Security for Developers [requirements] =>

Basics of any programming language    
Experience in developing applications

[overview] =>

This course will help professionals understand the value and limits of Application Security. While the Application Security Principals provides valuable awareness around some of the major risks in applications today, this course will highlight both the good and not so good.

This course is crucial because of the increasing need for developers to code in a secure manner. It is critical to introduce security as a quality component into the development cycle. This course aims at educating developers about various security vulnerabilities through hands-on practice using our purposely developed insecure web application.

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037503 [source_title] => Application Security for Developers [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => appsecdev ) [cl-and] => stdClass Object ( [course_code] => cl-and [hr_nid] => 154993 [title] => Android Security [requirements] => [overview] =>

Android is an open platform for mobile devices such as handsets and tablets. It has a large variety of security features to make developing secure software easier; however, it is also missing certain security aspects that are present in other hand-held platforms. The course gives a comprehensive overview of these features, and points out the most critical shortcomings to be aware of related to the underlying Linux, the file system and the environment in general, as well as regarding using permissions and other Android software development components.

Typical security pitfalls and vulnerabilities are described both for native code and Java applications, along with recommendations and best practices to avoid and mitigate them. In many cases discussed issues are supported with real-life examples and case studies. Finally, we give a brief overview on how to use security testing tools to reveal any security relevant programming bugs.

Participants attending this course will 

Audience

Professionals

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037231 [source_title] => Android Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-and ) [cl-anw] => stdClass Object ( [course_code] => cl-anw [hr_nid] => 155017 [title] => Network Security and Secure Communication [requirements] => [overview] =>

Implementing a secure networked application can be difficult, even for developers who may have used various cryptographic building blocks (such as encryption and digital signatures) beforehand. In order to make the participants understand the role and usage of these cryptographic primitives, first a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification and anonymity – is given, while also presenting the typical problems that may damage these requirements along with real-world solutions.

As a critical aspect of network security is cryptography, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical background, these elements are discussed from a developer's perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.

Typical crypto vulnerabilities are discussed both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.

Finally, as XML technology is central for data exchange by networked applications, the security aspects of XML are described. This includes the usage of XML within web services and SOAP messages alongside protection measures such as XML signature and XML encryption – as well as weaknesses in those protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.

Participants attending this course will

Audience

Developers, Professionals

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037232 [source_title] => Network Security and Secure Communication [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-anw ) [cl-cjw] => stdClass Object ( [course_code] => cl-cjw [hr_nid] => 154909 [title] => Combined C/C++, JAVA and Web Application Security [requirements] => [overview] =>

To serve in the best way heterogeneous development groups that are using various platforms simultaneously during their everyday work, we have merged various topics into a combined course that presents diverse secure coding subjects in didactic manner on a single training event. This course combines C/C++ and Java platform security to provide an extensive, cross-platform secure coding expertise.

Concerning C/C++, common security vulnerabilities are discussed, backed by practical exercises about the attacking methods that exploit these vulnerabilities, with the focus on the mitigation techniques that can be applied to prevent the occurrences of these dangerous bugs, detect them before market launch or prevent their exploitation.

Security components and service of Java are discussed by presenting the different APIs and tools through a number of practical exercises where participants can gain hands-on experience in using them. The course also covers security issues of web services and the related Java services that can be applied to prevent the most aching threats of the Internet based services. Finally, web- and Java-related security vulnerabilities are demonstrated by easy-to-understand exercises, which not only show the root cause of the problems, but also demonstrate the attack methods along with the recommended mitigation and coding techniques in order to avoid the associated security problems.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 28 [status] => published [changed] => 1700037230 [source_title] => Combined C/C++, JAVA and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-cjw ) [cl-cls] => stdClass Object ( [course_code] => cl-cls [hr_nid] => 155009 [title] => Application Security in the Cloud [requirements] => [overview] =>

Migrating to the cloud introduces immense benefits for companies and individuals in terms of efficiency and costs. With respect to security, the effects are quite diverse, but it is a common perception that using cloud services impacts security in a positive manner. Opinions, however, diverge many times even on defining who is responsible for ensuring the security of cloud resources.

Covering IaaS, PaaS and SaaS, first the security of the infrastructure is discussed: hardening and configuration issues as well as various solutions for authentication and authorization alongside identity management that should be at the core of all security architecture. This is followed by some basics regarding legal and contractual issues, namely how trust is established and governed in the cloud.

The journey through cloud security continues with understanding cloud-specific threats and the attackers’ goals and motivations as well as typical attack steps taken against cloud solutions. Special focus is also given to auditing the cloud and providing security evaluation of cloud solutions on all levels, including penetration testing and vulnerability analysis.

The focus of the course is on application security issues, dealing both with data security and the security of the applications themselves. From the standpoint of application security, cloud computing security is not substantially different from general software security, and therefore basically all OWASP-enlisted vulnerabilities are relevant in this domain as well. It is the set of threats and risks that makes the difference, and thus the training is concluded with the enumeration of various cloud-specific attack vectors connected to the weaknesses discussed beforehand.

Participants attending this course will

Audience

Developers, Managers, Professionals

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037232 [source_title] => Application Security in the Cloud [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-cls ) [cl-csc] => stdClass Object ( [course_code] => cl-csc [hr_nid] => 154749 [title] => C/C++ Secure Coding [requirements] =>

Basics of C/C++

[overview] =>

This three day course covers the basics of securing the C/C++ code against the malicious users who may exploit many vulnerabilities in the code with memory management and input handling, the course cover the principals of writing secure code.

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037227 [source_title] => C/C++ Secure Coding [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-csc ) [cl-jad] => stdClass Object ( [course_code] => cl-jad [hr_nid] => 154849 [title] => Advanced Java Security [requirements] => [overview] =>

Even experienced Java programmers are not mastering by all means the various security services offered by Java, and are likewise not aware of the different vulnerabilities that are relevant for web applications written in Java.

The course – besides introducing security components of Standard Java Edition – deals with security issues of Java Enterprise Edition (JEE) and web services. Discussion of specific services is preceded with the foundations of cryptography and secure communication. Various exercises deal with declarative and programmatic security techniques in JEE, while both transport-layer and end-to-end security of web services is discussed. The use of all components is presented through several practical exercises, where participants can try out the discussed APIs and tools for themselves.

The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform and web-related vulnerabilities. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1707138583 [source_title] => Advanced Java Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jad ) [cl-jpw] => stdClass Object ( [course_code] => cl-jpw [hr_nid] => 154917 [title] => Combined JAVA, PHP and Web Application Security [requirements] => [overview] =>

Even experienced programmers do not master by all means the various security services offered by their development platforms, and are likewise not aware of the different vulnerabilities that are relevant for their developments. This course targets developers using both Java and PHP, providing them essential skills necessary to make their applications resistant to contemporary attacks through the Internet.

Levels of Java security architecture are walked through by tackling access control, authentication and authorization, secure communication and various cryptographic functions. Various APIs are also introduced that can be used to secure your code in PHP, like OpenSSL for cryptography or HTML Purifier for input validation. On server side, the best practices are given for hardening and configuring the operating system, the web container, the file system, the SQL server and the PHP itself, while a special focus is given to client-side security through security issues of JavaScript, Ajax and HTML5.

General web vulnerabilities are discussed by examples aligned to the OWASP Top Ten, showing various injection attacks, script injections, attacks against session handling, insecure direct object references, issues with file uploads, and many others. The various Java- and PHP-specific language problems and issues stemming from the runtime environment are introduced grouped into the standard vulnerability types of missing or improper input validation, improper use of security features, incorrect error and exception handling, time- and state-related problems, code quality issues and mobile code-related vulnerabilities.

Participants can try out the discussed APIs, tools and the effects of configurations for themselves, while the introduction of vulnerabilities are all supported by a number of hands-on exercises demonstrating the consequences of successful attacks, showing how to correct the bugs and apply mitigation techniques, and introducing the use of various extensions and tools.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 28 [status] => published [changed] => 1700037231 [source_title] => Combined JAVA, PHP and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jpw ) [cl-jsc] => stdClass Object ( [course_code] => cl-jsc [hr_nid] => 154753 [title] => Standard Java Security [requirements] => [overview] =>

Description

The Java language and the Runtime Environment (JRE) was designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++. Yet, software developers and architects should not only know how to use the various security features of the Java environment (positive security), but should also be aware of the numerous vulnerabilities that are still relevant for Java development (negative security).

The introduction of security services is preceded with a brief overview of the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of these components is presented through several practical exercises, where participants can try out the discussed APIs for themselves.

The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform, covering both the typical bugs committed by Java programmers and the language- and environment-specific issues. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037227 [source_title] => Standard Java Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jsc ) [cl-jwa] => stdClass Object ( [course_code] => cl-jwa [hr_nid] => 154757 [title] => Java and Web Application Security [requirements] => [overview] =>

Description

Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are relevant for web applications written in Java, and the consequences of the various risks.

General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of Java with the most important aim to avoid the associated problems. In addition, a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

The course introduces security components of Standard Java Edition, which is preceded with the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of all components is presented through practical exercises, where participants can try out the discussed APIs and tools for themselves.

Finally, the course explains the most frequent and severe programming flaws of the Java language and platform. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037227 [source_title] => Java and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jwa ) [cl-jwe] => stdClass Object ( [course_code] => cl-jwe [hr_nid] => 154853 [title] => Advanced Java, JEE and Web Application Security [requirements] => [overview] =>

Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are relevant for web applications written in Java, and the consequences of the various risks.

General web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of Java with the most important aim to avoid the associated problems. In addition, a special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

The course introduces security components of Standard Java Edition, which is preceded with the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. Security issues of Java Enterprise Edition are presented through various exercises explaining both declarative and programmatic security techniques in JEE.

Finally, the course explains the most frequent and severe programming flaws of the Java language and platform. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 28 [status] => published [changed] => 1700037228 [source_title] => Advanced Java, JEE and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-jwe ) [cl-njs] => stdClass Object ( [course_code] => cl-njs [hr_nid] => 200321 [title] => Node.JS and Web Application Security [requirements] =>

Basic Web application development

[overview] =>

As a developer, your duty is to write bulletproof code.

What if we told you that despite all of your efforts, the code you have been writing your entire career is full of weaknesses you never knew existed? What if, as you are reading this, hackers were trying to break into your code? How likely would they be to succeed? What if they could steal away your database and sell it on the black market?

This Web application security course will change the way you look at code. A hands-on training during which we will teach you all the attackers’ tricks and how to mitigate them, leaving you with no other feeling than the desire to know more.

It is your choice to be ahead of the pack, and be seen as a game changer in the fight against cybercrime.

Delegates attending will:

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037257 [source_title] => Node.JS and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-njs ) [cl-nsc] => stdClass Object ( [course_code] => cl-nsc [hr_nid] => 154857 [title] => .NET, C# and ASP.NET Security Development [requirements] => [overview] =>

A number of programming languages are available today to compile code to .NET and ASP.NET frameworks. The environment provides powerful means for security development, but developers should know how to apply the architecture- and coding-level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation.

The aim of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from performing privileged actions, protect resources through strong authentication and authorization, provide remote procedure calls, handle sessions, introduce different implementations for certain functionality, and many more.

Introduction of different vulnerabilities starts with presenting some typical programming problems committed when using .NET, while the discussion of vulnerabilities of the ASP.NET also deals with various environment settings and their effects. Finally, the topic of ASP.NET-specific vulnerabilities not only deals with some general web application security challenges, but also with special issues and attack methods like attacking the ViewState, or the string termination attacks.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037228 [source_title] => .NET, C# and ASP.NET Security Development [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-nsc ) [cl-nwa] => stdClass Object ( [course_code] => cl-nwa [hr_nid] => 154873 [title] => Advanced C#, ASP.NET and Web Application Security [requirements] => [overview] =>

Beyond solid knowledge in using various security features of .NET and ASP.NET, even for experienced programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side along with the consequences of the various risks.

In this course the general web-based vulnerabilities are demonstrated through presenting the relevant attacks, while the recommended coding techniques and mitigation methods are explained in the context of ASP.NET. A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5.

The course also deals with the security architecture and components of the .NET framework, including code- and role based access control, permission declaration and checking mechanisms and the transparency model. A brief introduction to the foundations of cryptography provides a common practical baseline for understanding the purpose and the operation of various algorithms, based on which the course presents the cryptographic features that can be used in .NET.

Introduction of different security bugs follows the well-established vulnerability categories, tackling input validation, security features, error handling, time- and state-related problems, the group of general code quality issues, and a special section on ASP.NET-specific vulnerabilities. These topics are concluded with an overview on testing tools that can be used to automatically reveal some of the learnt bugs.

Topics are presented through practical exercises where participants can try out the consequences of certain vulnerabilities, the mitigations, as well as the discussed APIs and tools for themselves.

Participants attending this course will

Audience

Developers

[category_overview] => [outline] => [language] => en [duration] => 21 [status] => published [changed] => 1700037229 [source_title] => Advanced C#, ASP.NET and Web Application Security [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-nwa ) [cl-osc] => stdClass Object ( [course_code] => cl-osc [hr_nid] => 155025 [title] => The Secure Coding Landscape [requirements] => [overview] =>

The course introduces some common security concepts, gives an overview about the nature of the vulnerabilities regardless of the used programming languages and platforms, and explains how to handle the risks that apply regarding software security in the various phases of the software development lifecycle. Without going deeply into technical details, it highlights some of the most interesting and most aching vulnerabilities in various software development technologies, and presents the challenges of security testing, along with some techniques and tools that one can apply to find any existing problems in their code.

Participants attending this course will 

Audience

Managers

[category_overview] => [outline] => [language] => en [duration] => 14 [status] => published [changed] => 1700037233 [source_title] => The Secure Coding Landscape [source_language] => en [cert_code] => [weight] => 0 [excluded_sites] => [use_mt] => stdClass Object ( [field_overview] => [field_course_outline] => [field_prerequisits] => [field_overview_in_category] => ) [cc] => cl-osc ) ) [codes] => Array ( [0] => appsecdev [1] => cl-and [2] => cl-anw [3] => cl-cjw [4] => cl-cls [5] => cl-csc [6] => cl-jad [7] => cl-jpw [8] => cl-jsc [9] => cl-jwa [10] => cl-jwe [11] => cl-njs [12] => cl-nsc [13] => cl-nwa [14] => cl-osc ) ) [4] => Array ( [regions] => Array ( [ec_4966] => Array ( [tid] => ec_4966 [title] => Guayaquil [sales_area] => ec_ecuador [venues] => Array ( [ec_15661446] => Array ( [vid] => ec_15661446 [title] => Guayaquil - Mall del Sol [vfdc] => 175.00 [prices] => Array ( [1] => Array ( [remote guaranteed] => 7937 [classroom guaranteed] => 8462 [remote guaranteed per delegate] => 7937 [delegates] => 1 [adp] => 1237 [classroom guaranteed per delegate] => 8462 ) [2] => Array ( [remote guaranteed] => 9174 [classroom guaranteed] => 9880 [remote guaranteed per delegate] => 4587 [delegates] => 2 [adp] => 1237 [classroom guaranteed per delegate] => 4940 ) [3] => Array ( [remote guaranteed] => 10410 [classroom guaranteed] => 11295 [remote guaranteed per delegate] => 3470 [delegates] => 3 [adp] => 1237 [classroom guaranteed per delegate] => 3765 ) [4] => Array ( [remote guaranteed] => 11648 [classroom guaranteed] => 12712 [remote guaranteed per delegate] => 2912 [delegates] => 4 [adp] => 1237 [classroom guaranteed per delegate] => 3178 ) [5] => Array ( [remote guaranteed] => 12885 [classroom guaranteed] => 14130 [remote guaranteed per delegate] => 2577 [delegates] => 5 [adp] => 1237 [classroom guaranteed per delegate] => 2826 ) [6] => Array ( [remote guaranteed] => 14124 [classroom guaranteed] => 15546 [remote guaranteed per delegate] => 2354 [delegates] => 6 [adp] => 1237 [classroom guaranteed per delegate] => 2591 ) [7] => Array ( [remote guaranteed] => 15358 [classroom guaranteed] => 16961 [remote guaranteed per delegate] => 2194 [delegates] => 7 [adp] => 1237 [classroom guaranteed per delegate] => 2423 ) [8] => Array ( [remote guaranteed] => 16600 [classroom guaranteed] => 18384 [remote guaranteed per delegate] => 2075 [delegates] => 8 [adp] => 1237 [classroom guaranteed per delegate] => 2298 ) [9] => Array ( [remote guaranteed] => 17829 [classroom guaranteed] => 19800 [remote guaranteed per delegate] => 1981 [delegates] => 9 [adp] => 1237 [classroom guaranteed per delegate] => 2200 ) [10] => Array ( [remote guaranteed] => 19070 [classroom guaranteed] => 21220 [remote guaranteed per delegate] => 1907 [delegates] => 10 [adp] => 1237 [classroom guaranteed per delegate] => 2122 ) ) ) ) ) [ec_4967] => Array ( [tid] => ec_4967 [title] => Quito [sales_area] => ec_ecuador [venues] => Array ( [ec_15661447] => Array ( [vid] => ec_15661447 [title] => Quito - Av Eloy Alfaro [vfdc] => 200.00 [prices] => Array ( [1] => Array ( [remote guaranteed] => 7937 [classroom guaranteed] => 8537 [remote guaranteed per delegate] => 7937 [delegates] => 1 [adp] => 1237 [classroom guaranteed per delegate] => 8537 ) [2] => Array ( [remote guaranteed] => 9174 [classroom guaranteed] => 9924 [remote guaranteed per delegate] => 4587 [delegates] => 2 [adp] => 1237 [classroom guaranteed per delegate] => 4962 ) [3] => Array ( [remote guaranteed] => 10410 [classroom guaranteed] => 11310 [remote guaranteed per delegate] => 3470 [delegates] => 3 [adp] => 1237 [classroom guaranteed per delegate] => 3770 ) [4] => Array ( [remote guaranteed] => 11648 [classroom guaranteed] => 12700 [remote guaranteed per delegate] => 2912 [delegates] => 4 [adp] => 1237 [classroom guaranteed per delegate] => 3175 ) [5] => Array ( [remote guaranteed] => 12885 [classroom guaranteed] => 14085 [remote guaranteed per delegate] => 2577 [delegates] => 5 [adp] => 1237 [classroom guaranteed per delegate] => 2817 ) [6] => Array ( [remote guaranteed] => 14124 [classroom guaranteed] => 15474 [remote guaranteed per delegate] => 2354 [delegates] => 6 [adp] => 1237 [classroom guaranteed per delegate] => 2579 ) [7] => Array ( [remote guaranteed] => 15358 [classroom guaranteed] => 16856 [remote guaranteed per delegate] => 2194 [delegates] => 7 [adp] => 1237 [classroom guaranteed per delegate] => 2408 ) [8] => Array ( [remote guaranteed] => 16600 [classroom guaranteed] => 18248 [remote guaranteed per delegate] => 2075 [delegates] => 8 [adp] => 1237 [classroom guaranteed per delegate] => 2281 ) [9] => Array ( [remote guaranteed] => 17829 [classroom guaranteed] => 19629 [remote guaranteed per delegate] => 1981 [delegates] => 9 [adp] => 1237 [classroom guaranteed per delegate] => 2181 ) [10] => Array ( [remote guaranteed] => 19070 [classroom guaranteed] => 21020 [remote guaranteed per delegate] => 1907 [delegates] => 10 [adp] => 1237 [classroom guaranteed per delegate] => 2102 ) ) ) ) ) ) [remote] => Array ( [1] => Array ( [remote guaranteed] => 7937 [remote guaranteed per delegate] => 7937 [adp] => 1237 ) [2] => Array ( [remote guaranteed] => 9174 [remote guaranteed per delegate] => 4587 [adp] => 1237 ) [3] => Array ( [remote guaranteed] => 10410 [remote guaranteed per delegate] => 3470 [adp] => 1237 ) [4] => Array ( [remote guaranteed] => 11648 [remote guaranteed per delegate] => 2912 [adp] => 1237 ) [5] => Array ( [remote guaranteed] => 12885 [remote guaranteed per delegate] => 2577 [adp] => 1237 ) [6] => Array ( [remote guaranteed] => 14124 [remote guaranteed per delegate] => 2354 [adp] => 1237 ) [7] => Array ( [remote guaranteed] => 15358 [remote guaranteed per delegate] => 2194 [adp] => 1237 ) [8] => Array ( [remote guaranteed] => 16600 [remote guaranteed per delegate] => 2075 [adp] => 1237 ) [9] => Array ( [remote guaranteed] => 17829 [remote guaranteed per delegate] => 1981 [adp] => 1237 ) [10] => Array ( [remote guaranteed] => 19070 [remote guaranteed per delegate] => 1907 [adp] => 1237 ) ) [currency] => USD ) [5] => Array ( [0] => 5 ) [6] => Array ( [422727] => Array ( [title] => Comprehensive C# and .NET Application Security [rating] => 5 [delegate_and_company] => Alma Xocua - PASE, Servicios Electrónicos S.A. de C.V. [body] => Me gustó ver desarrollo seguro en ASP.NEt pero hicieron falta ejercicios práticos para implementar en el dia a dia de los desarrolladores [mc] => [is_mt] => 0 [nid] => 422727 ) ) [7] => 5 [8] => 1 [9] => 1 [10] => ) ) [6] => Array ( [file] => /apps/nobleprog-website/core/routes.php [line] => 19 [function] => course_menu_callback [args] => Array ( [0] => /en/cc/cl-ans ) ) [7] => Array ( [file] => /apps/nobleprog-website/__index.php [line] => 100 [args] => Array ( [0] => /apps/nobleprog-website/core/routes.php ) [function] => require_once ) [8] => Array ( [file] => /apps/nobleprog-website/_index.php [line] => 26 [args] => Array ( [0] => /apps/nobleprog-website/__index.php ) [function] => include_once ) [9] => Array ( [file] => /apps/hitra7/index.php [line] => 54 [args] => Array ( [0] => /apps/nobleprog-website/_index.php ) [function] => include_once ) )