Specialized Pentesting Courses | Home | About | Contact | Blog | Glossary         

 QUICK CONTACT

NAME :
EMAIL :
PHONE :
COUNTRY :
STATE :
SUBJECT :
COURSE :
MESSAGE :
  
   







Download in PDF:    This Course   

EC-Council Certified Secure Programmer [E|CSP]

EC-Council Certified Secure Programmer lays the basic foundation required by all application developers and development organizations to produce applications with greater stability and posing lesser security risks to the consumer. The Certified Secure Application Developer standardizes the knowledge base for application development by incorporating the best practices followed by experienced experts in the various domains.

The distinguishing aspect of software security course ECSP is that unlike vendor or domain specific certifications, it exposes the aspirant to various programming languages from a security perspective. This drives greater appreciation for the platform / architecture / language one specializes on as well as an overview on related ones.

Who should attend

The ECSP certification is intended for programmers who are responsible for designing and building secure Windows/Web based applications with .NET/Java Framework. It is designed for developers who have C#, C++, Java, PHP, ASP, .NET and SQL development skills.


[E|CSP] Certification Track

Exams Exam Code Recommended Training
 Exam 1   312-92   EC-Council E|CSP


Training we offer:

Course Name  EC-Council E|CSP 
Course Duration  5 days (9am-5pm) or 2 months (2hrs/day) 
Course Mode  Training Academy or On-site Training for Corporates & Colleges
Prerequisite  EC-Council C|EH 



[E|CSP] Syllabus

  1. Introduction to Secure Coding
  2. Designing Secure Architecture
  3. Cryptography
  4. Buffer Overflows
  5. Secure C and C++ Programming
  6. Secure Java and JSP Programming
  7. Secure Java Script and VB Script Programming
  8. Secure ASP Programming
  9. Secure Microsoft.NET Programming
  10. Secure PHP Programming
  11. Secure PERL Programming
  12. Secure XML, Web Services and AJAX Programming
  13. Secure RPC, ActiveX and DCOM Programming
  14. Secure Linux Programming
  15. Secure Linux Kernel Programming
  16. Secure Xcode Programming
  17. Secure Oracle PL/SQL Programming
  18. Secure SQL Server Programming
  19. Secure Network Programming
  20. Windows Socket Programming
  21. Writing Shellcodes
  22. Writing Exploits
  23. Programming Port Scanners and Hacking Tools
  24. Secure Mobile phone and PDA Programming
  25. Secure Game Designing
  26. Securing E-Commerce Applications
  27. Software Activation, Piracy Blocking and Automatic Updates
  28. Secure Application Testing
  29. Writing Secure Documentation and Error Messages
 



Back to top





















































































ARIZONA Infotech © Copyright 2017 . All Rights Reserved