PGDCoursesBrochures

Logo
Separator

PG Diploma in Advanced Secure Software Development



Advancements in digital technologies are rapidly transforming the world and in order to sustain in IT industry it is very important to upgrade the technical skills in line with latest developments along with strong programming basics. PG Advanced Secure Software Development (PG-DASSD) course focuses on security requirements for modern software development with equal emphasis on programming foundations to make the students suitable to work in IT industry from day one. Course gives special emphasis to the emerging technologies such as Blockchain Technology and Machine Learning and their use cases in Cyber Security.

In today's scenario, Cyber Security threats are majorly addressed reactively, but by following proper Software Security practices we can minimize the attack surface and address this problem proactively. Therefore Software Security knowledge is the requirement of every Software Engineer. Software Security aspects including Secure Software Development Life Cycle are focussed as separate modules and also relevant topics are built in every module of the course. The course focuses on Programming Basics, Linux System Programming, Secure Network Programming, Software Security, Secure Web Application Development & Java Programming, Secure Android Programming and Emerging Technologies such as Blockchain and Machine Learning for cyber security. Project work would focus on solving Cyber Security problem using Machine Learning and Blockchain Technologies.

  • Graduate in Engineering (10+2+4 or 10+3+3 years) in IT / Computer Science / Electronics / Telecommunications / Electrical / Instrumentation. OR MSc/MS (10+2+3+2 years) in Computer Science, IT, Electronics. 
  • Mathematics in 10+2 (exempted for candidates with Diploma + Engineering) OR
  • MCA with minimum 55% marks in the qualifying degree


The course fees of Post Graduate Diploma in Advanced Secure Software Development (PG-DASSD) is INR. 81,000/- plus Goods and Service Tax (GST) as applicable by Government of India currently @ 18%.

The course fees has to be paid in two installments:

1. First Installment of INR 10,000/- plus GST @ 18% at the time of counseling.
2. Second Installment of INR 71,000/- plus GST @ 18% as per schedule before joining the PG - DASSD course.
  

Basics - Introduction to GNU Tool chain, Linux environment and VI editor, Tokens of C - Keywords, Data-Types, Variables, Constants, Operators, Identifiers, Storage Class Specifiers, Control Flow Statements, GNU Make utility, Arrays, Multidimensional arrays, Data Input & Output, Strings, Loops - for, while etc., Functions and Recursion

Advanced - Pointers - Intro, Pointer Arithmetic, Pointers and Arrays, Pointers and Functions, Pointers and Strings, Structures, Unions, Enum, Typedef, Bit field operators and pointers with structures, Preprocessors, C and Assembly, Files, I/O, Variable No. of arguments, Command Line arguments, Error handling and debugging with GNU GDB

Low Level Security - Memory layout, Calling Conventions - cdecl, std, fastcall,, Format string problems, Stack Overflow, Buffer Overflow, Integer Overflows, Introduction to various C standards, Secure Coding in C - SEI CERT C coding standard

  

Introduction to Data Structures, Complexity of Algorithms - Space and time complexity

Linked Lists, Stacks, Queues, Sorting algorithms - Bubble, selection, insertion, quick, merge and heap sort, Searching algorithms - linear and binary search, Hashing - collision, collision resolution techniques, Trees - Binary trees, Binary search trees, AVL trees

Graphs - terminology, breadth first and depth first traversals, spanning trees, minimum spanning tree algorithms, shortest path algorithms, Pattern Matching algorithms

  

  • OS Organization, Architecture, Structure and Operations.
  • Process Management - Processes, Threads, Concurrency, Process Synchronization, CPU Scheduling, Static and Shared Libraries.
  • Memory Management -  Main Memory and Virtual Memory
  • Filesystem Management - File System interface
  • Introduction to Virtualization Technologies - Type 1 and Type 2, Hypervisor, Paravirtualization, Full Virtualization, cgroups (control groups) and containers etc.
  • IPC mechanisms  - Pipes, Named Pipes, FIFOs, Message Queues, Mutexes, Condition Variables, Read Write locks, Semaphores, Shared Memory
  • Access Control Mechanisms - Discretionary Access Control & Mandatory Access Control

  

  • Computer Security Concepts, Networking Devices (Routers/Switches/Bridges), Security Attacks: Active & Passive, Introduction to Bug, Vulnerability, Threat, Attack, Exploit. Popular attacks launched by exploiting the vulnerabilities
  • Security Services - Authentication, Access Control, Data Confidentiality, Data Integrity, Non-Repudiation & Availability.
  • Security Mechanisms, Classical Encryption - Cryptography, Cryptanalysis & Brute Force Attacks, Substitution & Transposition Techniques, Cryptographically strong random numbers/APIs, Introduction to Steganography, Denial of Service (DoS) Attacks & Distributed Denial of Service Attacks (DDoS), Stream Ciphers & Block Ciphers, Public Key Cryptography & RSA, Diffie-Hellman Key Exchange & Man-in-the-Middle Attack, Message Authentication Code (MAC), Hash Functions & Hashed Message Authentication Code (HMAC).
  • Digital Signatures, Digital Certificates, X.509 & Public-key Infrastructure (PKI)
  • Firewalls: Characteristics, Types, Bastion Host & Firewall Locations & Configurations.
  • Intrusion Detection and Intrusion Prevention Systems, Signature Based/Flow Based/Anomaly Detection Based, Trustworthy Log Generation
  • Security Protocols - Pretty Good Privacy & S/MIME, VPN – IPSec,  Secure Sockets Layer (SSL) & Transport Layer Security (TLS) & DNS Security (DNSSEC)

Software Security

68 Hours  
  

Basic cryptography and programing with Crypto API, Code Injections, Memory safety, Type safety, ret2libc, ROP, Control flow integrity etc., Introduction to Vulnerability, Threat, Attack, Bug, Exploit., Secure Software Development Lifecycle - Threat Modeling etc., Usability Aspects of Security - HCI, prototyping, security evaluation, Malware and antivirus technologies, Program Analysis - Static Analysis,  Dynamic Analysis, Symbolic Execution etc.

Static Analysis - Software reverse engineering methods overview, Exploring software binary formats – PE, ELF etc., Exploit development, Dynamic/Runtime analysis – Executing binaries in controlled environment, Overview of protection mechanisms – obfuscation etc.

  

Introduction to TCP/IP Networking Stack , Socket Introduction, Elements of TCP sockets, TCP Client-Server, I/O Multiplexing (select/poll), Elements of UDP sockets, Non-blocking I/O & IOCTL operations, Multicast Programming, Overview of IPv6 and its features, Develop sniffer program & Security analysis of  network traffic, SSL/TLS protocol - Introduction to SSL Protocol, Integrating SSL with client-server application , Replay attacks and mitigations, Choosing the secure cipher suites for SSL

  

Introduction - Object Oriented Programming and concepts, Java language and its features, JDK, JRE and JVM, Basic Programming Constructs - Charset, identifiers, data types, variables, constants, literals operators, decision making statements (if, switch), iterative statements (while, do, for and for-each), jump statements (break, continue and return) and keywords, Classes and Objects, Data and methods members - Types of variables and their scope, Creating objects, Constructors, Overloading, Parameter passing in Java, this and static keywords, JVM and Garbage Collection - Java Virtual Machine and subsystems, Class loading and Execution Engine systems, Java runtime memory system,

Inheritance and Polymorphism - Visibility modifiers, extends and super keywords, Abstract classes, Run-time polymorphism, Interfaces, Inner classes, Anonymous inner classes, Packages and Wrapper Classes - Importing  packaging, Defining custom packages, Wrapper classes, Modifiers in Java, Exception Handling - Introduction to exceptions – checked and unchecked, Java’s exception handling mechanism, Writing custom exceptions in Java, Arrays and Strings - Arrays, Strings, String constant pool, String comparison and methods, Stringbuffer and Stringbuilder classes, Command line arguments

IO Streams - Text Streams – Reader and Writer, Byte Streams – InputStream and OutputStream, File IO –Filereader and Filewriter , Processing Buffers, Ways of reading data from Keyboard, Multi-Threading- Concept of Thread and thread life cycle, Creating a thread, Thread class and its methods, Thread synchronization and inter thread communication

Java Collection Framework - Need of collections in Java, Key interfaces of Collection Framework – Collection, List, Set, Queue, Map, etc.,Legacy and non-legacy collection classes, Iterators and Enumerator, Utility classes – Collections and Arrays, Exploring java.util package – Date, Calendar, Scanner etc. Generic Programming in Java, Introduction, Writing a Generic Class, Passing Objects of a Generic Class to a Method, Writing Generic Methods, Constraining a Type Parameter in a Generic Class, Use of wildcards – upper and lower bounds, , Secure Coding in Java, SEI CERT Java coding standard, Design Patterns in Java

  

Android Basics - Overview of Android Platform & Android Building Blocks, Overview of Android Application Components (Activity, Intents, Broadcast , Receiver, Content Providers, Service), Android Permission Model and Application Sandboxing, Android application development - Android GUI Development and Event Handling, Programming on Android Application components, Android development using third party libraries - Retrofit, Picasso, Secure Coding in Android - SEI CERT Android coding standard, Secure data storage options in Android, Security assessment of Android applications - Reverse Engineering & Obfuscation techniques, Static and Dynamic analysis with open source tools, MASVS OWASP as Security assessment case study, AOSP introduction & build process

  

Architecture of Web - Brief history of the Internet, Internet protocol; HTTP protocol; Domain names; Domain Names Service Servers, Methods (GET, POST, HEAD, PUT, DELETE), HTTP session, Status codes, Persistent connections, HTTPS, Apache server Configuration, HTML - Introduction to HTML5, Anchor Tag, Paragraph, Images and Pictures, Tables, HTML Forms, Controls, HTML5 Validation, INPUT, Text Area, Radio Button, Check Box, Dropdown, List box, Submit button, Document Object Model (DOM), Elements, Events, Canvas, Audio & Video Elements, Geo-location Support

Working with CSS - Introduction to CSS, Styling HTML with CSS, Structuring pages with CSS using Inline Styling (Inline CSS), External Styling (External CSS), The id Attribute, class Attribute

CSS properties and manipulating properties with JavaScript, CSS Buttons, Pagination, Box Sizing, Animations, JavaScript - Introduction to JavaScript, Data types, Comparison Operators, Control statements (for, while, switch etc), JavaScript Arrays, Objects, Functions (Named, Unnamed function expressions), Inheritance in JavaScript, Asynchronous Handling (setTimeout, setInterval, Promise, Async), JavaScript Object parsing, TypeScript – Overview, Environment Setup, Basic Syntax, Variables, operators, Datatypes, , Arrays, Functions, Classes & Objects, Namespaces, Modules, Web APIs, MySQL database, Web security - Cross-Site Scripting (XSS), SQL Injection, Cross-site request forgery (CSRF), Best Practices to Secure REST APIs, Security standards (OWASP)

  

Mathematics for Machine Learning - Linear Algebra (Including Matrix Operations), Probability & Statistics, Python  libraries for Machine Learning (Numpy, Pandas, Matplotlib, Scikit-learn), Introduction to Supervised, Unsupervised and Semi-supervised Learning, Exploratory Data Analysis, Data pre-processing & Feature engineering, Regression - Linear Regression, Gradient Descent, Multiple Linear Regression, Support Vector Machine (SVM), KNN, Evaluation of Regression Models, Classification - Logistic regression, KNN, SVM, Decision Trees, Naive Bayes

Evaluation of Classification Models, Unsupervised learning - K-Means, Case study in cyber security domain, ML for Android and a Case study

Project and Seminar

120 Hours  
  

The course is designed to provide a comprehensive knowledge from system programing to application development considering latest technologies such as blockchain, machine learning etc. and in parallel providing lateral understanding of security concepts.

It is targeted to the candidates who are interested in learning latest technologies along with the in-depth understanding of programing and security concepts.  The course will enable them to work on current technology scenarios as well as prepare them to keep pace with the changing face of technology and the requirements of the growing IT industry. The course curriculum has been designed keeping in view the emerging trends for cyber security as well as contemporary and futuristic human resource requirements of the ICT industry. 

After doing this course students can work as Application/Web/Mobile/cyber security solution developer, System programmer etc. He / She will be able to use secure software engineering principles.

C-DACs - Advanced Computing Training School
Address
:
Plot No. 6 & 7, Hardware Park, Sy No. 1/1, Srisailam Highway, Pahadi Shareef Via Keshavagiri (Post), Hyderabad
Andhra Pradesh 500016
Telephone
:
040-2373 7127
Contact Person
:
Mr. Sharanabasappa , Senior Technical Officer
Fax
:
040-2374 3382
e-Mail
:
cdachyd[at]cdac[dot]in
Courses
:
PG-DAC, PG-DVLSI, PG-DESD, PG-DSSD, PG-DASSD, e-DAC
C-DACs - Advanced Computing Training School
Address
:
Plot No. 6 & 7, Hardware Park, Sy No. 1/1, Srisailam Highway, Pahadi Shareef Via Keshavagiri (Post), Hyderabad
Telangana 500005
Telephone
:
040-23737127
Contact Person
:
Mr.Sharanabasappa, Senior Technical Officer
Fax
:
040-2374 3382
e-Mail
:
cdachyd@cdac.in
Courses
:
PG-DITISS