NORTH AMERICA EMEA ASIA
All programs BankAudit 2013 InfoSec World Conference & Expo 2013 SuperStrategies Conference & Expo 2013 The Conference on Big Data Security
All programs The Audit Directors & Managers Symposium The MIS Audit Leadership Institute The MIS CAE Master's Program
 
     Conferences            >      Seminars            >      Symposia            >      Webinars      Online Self Study      Training Weeks      In-House Training      Certificate Programs>      Exhibiting Info      Ways to Save      Request Info      Event Downloads      White Papers      Call for Instructors      Contact MIS      Site Map
Internal Audit IT Audit Info Security
Internal Audit IT Audit Info Security
Application Security and Audit Boot Camp - ASG341 
Designing and Ensuring End-to-End Security and Compliance in Today's E-Business Applications
Learning Level: Intermediate
CPEs: 40 Fee: $2,995.00
Focus and Features Who Should Attend Agenda Register
Agenda

What You Will Learn
1. Identity and Access Control Management (I&ACM) Architecture
- goals for information security safeguards in applications
- defining an enterprise I&ACM architecture
- access control models and architectures
- security audit log management in multi-tiered applications
- TCP/IP network application services security risk analysis
- enterprise directory services
- client/server and middleware security for multi-tiered applications
- locating control points in complex, multi-tiered applications

2. Web Application Architectures
- inventorying your application software environments
- Web application building blocks and control points
- HTTP protocol and state management: cookies, hidden fields, viewstate, querystrings
- Web application markup languages: HTML, XML- HTTPS/SSL session encryption
- single/reduced sign-on (SSO) pros and cons
- common Web application threats and vulnerabilities
- Web application security strategies

3. Web (HTTP) Server Security and Audit
- summary of baselines for secure server operating system security
- Web server configuration: operational and security requirements
- comparing and contrasting Web server access control security features: Apache, Microsoft IIS
- perils and protections for remote Web application development
- application firewalls and intrusion prevention systems
- tools, techniques, and checklists for discovering and testing Web servers security

4. Security in Application Software Design
-
server-side Web page programming security: SSI, CGI, ASP, PHP, Java/JSP, ASP.NET (VB.NET, C#)
- mobile code security: Java Applets, ActiveX, VBScript, JavaScript, AJAX, Flash ActionScript
- common security vulnerabilities and attacks on Web application software
- attacks on Web servers: cross-site scripting, SQL injection, buffer overflow
- input validation and editing
- software change controls and configuration management
- web application vulnerability and testing tools
- tools, techniques, and checklists for auditing security in application design

5. Application (Middleware) Servers
- roles, architecture, and security control points for XML/object-oriented development environments and associated application servers
- defining key sources of application server security: declarative vs. programmatic controls, database and Enterprise Information System (EIS) connectors
- security and audit features in components and servers
- tools and techniques for securing and auditing application servers

6. Securing and Auditing File Sharing and Database Management Systems
- methods for providing data access to users and other applications
- data access control, authorization, and audit
- file sharing technologies: Windows file shares, SAMBA, Network File Systems (NFS)
- relational database management systems (DBMS)
- Structured Query Language (SQL): more than just query
- security risks associated DBMS systems
- comparing security and audit features for major DBMS products
- tools, techniques, and checklists for securing and auditing DBMS components

7. Web Services and Service-Oriented Architectures
- Simple Object Access Protocol (SOAP) Web services definition and architecture
- SOAP Web services standards
- Service Oriented Architectures (SOA)
- SOA Enterprise Service Bus (ESB) Representational State Transfer (REST) Web services
- Web services security and audit tools, and techniques

8. Remote Access and Mobile Application Security and Audit
- key control points in remote access and mobile applications
- how mobile application differ from internal server based applications
- tools and techniques for protecting the contents of mobile devices
- gateways for mobile applications: vulnerabilities and safeguards
- checklist for secure mobile and wireless application best practices

 
REGISTRATION QUESTIONS?
For questions about your registration, government and team discounts, or multiple registrations, please call Linda Ronconi at (508) 879-7999, ext. 501 or e-mail mis@misti.com.

IN-HOUSE SEMINARS
This seminar is available in-house. For more information about bringing this or other MIS seminars to your organization, please call Mimi Hatch at (410) 692-2465 or e-mail mhatch@misti.com.

 



Dates/Locations
March 18 - 22, 2013
New York
August 12 - 16, 2013
San Francisco