0% found this document useful (0 votes)
20 views4 pages

ApplicationSecurity Syllabus

Uploaded by

Abhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views4 pages

ApplicationSecurity Syllabus

Uploaded by

Abhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

TITLE Application Security

SUBJECT CODE 22BCACS603

HOURS PER WEEK 3


CREDITS 3

COURSE OBJECTIVES:
COB1 To Formulate Programs using secured programming constructs.

COB2 To distinguish basic concepts and advanced features of Object-Oriented Programming.

COB3 To comprehend the concepts of Java secure programming


COB4 To build applications with cryptography techniques using java programs
COB5 To teach design and development of java secured applications.

COURSE OUTCOMES:
CO1 Develop simple applications in C using basic constructs

CO2 Solve the given problem and design practical applications using object-oriented programming concepts.
CO3 Debug the programs by applying concepts and error handling techniques of Java.

CO4 Create dynamic websites / Web based applications using C, C++ and Java secured programming.

CO5 Develop responsive websites using the programming languages and techniques associated with the World Wide Web.
SYLLABUS

MODULE CO
CONTENTS Assessments and Activity PO Mapping
NO Mapping

Secure Programming with C Assignment on CO1 PO1, PO3, PO4, PO6,


Programming Attacks, File PO10
Introduction to C - Preventing Buffer Overflows, Stack- system vulnerabilities
Module 1 Smashing, and Return-Oriented Programming Attacks-Correctly
[ 9 Hours] Using Formatted Output Functions Without Introducing Format-
String Vulnerabilities-Securely Using Different Variable Types -
Understanding Issues with Pointers-Performing Secure I/O and
Avoiding File System Vulnerabilities
Secure Programming with C++ Flip classes and group CO1, CO2 PO1, PO6, PO8,
Module 2 discussion on Battling PO10
[ 9 Hours] Introduction to C++ Programming - Battling Integer integer vulnerabilities
Vulnerabilities in C++ - Memory Management in C++ - Pointers
Subterfuge and Object Misuse in C++
Secure Programming with C++ Certification courses on CO1, PO1, PO4, PO6, PO8,
concurrency CO2, CO3 PO9, PO10, PO11,
Module 3 Injection Vulnerabilities in C++ - Eliminate Common Issues with and PO12
[ 9 Hours] Multithreaded Programming: Concurrency and Parallelism -
parallelism
Exceptions and Error Handling in C++ - Industry Resources and
Best Practices for C++ Development
Secure Programming with Java Poster Presentation on CO1, PO3, PO6, PO8, PO9,
Module 4 Secure Coding Practices CO2, CO4 PO10
[9 Hours] Introduction to Java Security - Secure Application Design - for Error Handling
Secure Coding Practices for Cryptography - Secure Coding
Practices for Error Handling
Secure Programming with Java CO1, CO2, PO1, PO9, PO10,
CO3, CO4, PO11, PO12
Module 5 Concurrency and Race Conditions - Concurrency and Race Group Presentations CO5
[9 Hours] Condition Vulnerabilities - Secure Coding Practices for onSecure coding
Authentication, Authorization, and Session Management - Static practices.
and Dynamic Application Security Testing

PRESCRIBED TEXTBOOKS:

1. Secure Programming with C by Howard Poston, October 2020, Publisher: EC Council (Chapter:1-2)
2. Secure Programming with C++ by Howard Poston, July 2020, Publisher: EC Council (Chapter:1-3,Chapter:4-8)
3. Secure Programming with Java by Howard Poston, December 2020, Publisher: EC Council (Chapter:1-8)

REFERENCES:

1. Securing Coding in C and C++ Second Edition by Robert C. Seacord – Pearson Education, Inc, 2013.
2. Secure Java – For Web Application Development by Abhay Bhargav and B.V. Kumar, CRC Press, Taylor & Francis Group, LLC, 2011.
3. Certified Application Security Engineer- JAVA: Technology Workbook by IP Specialist, Pri mooz (Author), Kindle Edition

WEBSITE REFERENCES / LINKS:

1. https://www.oreilly.com/library/view/secure-programming-with/330220BCRV/
2. https://www.oreilly.com/library/view/secure-programming-with/022049BCRV/
3. https://www.oreilly.com/library/view/secure-programming-with/200220BCRV/
4. http://index-of.es/Java/Abhay%20Bhargav,%20B.%20V.%20Kumar%20-
%20Secure%20Java%20For%20Web%20Application%20Development%20-%202010.pdf (Secure Java-Abhay)
5. https://www.eccouncil.org/wp-content/uploads/2019/03/CASE-Java-Exam-Blueprint-v1.pdf
6. https://www.eccouncil.org/programs/application-security-training/

You might also like