C# 2005: Security


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
To recognize the different types of security supported by C# 2005 and how they work, and to use them in application development

Target Audience
Employees, consultants, and students that are preparing for the Technology Specialist: Microsoft .NET Framework 2.0 - Application Development Foundation Certification Exam (70-536)

Prerequisites
Familiarity with concepts and architecture of software development and business applications; development experience in an object-oriented programming language preferable

Expected Duration (hours)
2.8

Lesson Objectives

C# 2005: Security

  • implement evidence-based security in a given scenario.
  • implement role-based security in a given scenario.
  • implement .NET and IIS security in a given scenario.
  • implement file security and authentication in a given scenario.
  • implement code access permissions in a given scenario.
  • implement file security, authentication, and code access permissions in a given scenario.
  • implement symmetric and asymmetric cryptography in a given scenario.
  • use hash algorithms and the Data Protection API in a given scenario.
  • use cryptography in a given scenario.
  • Course Number:
    241294_eng