Desktop Application Security in Python


Course Number: SEC-152TP
Duration: 3 days (19.5 hours)
Format: Live, hands-on

Python Security Training (Desktop) Overview

This Desktop Application Security in Python course teaches developers basic and advanced skills for building secure desktop applications using Python. Participants learn how to identify and mitigate threats, implement secure coding practices, and leverage cryptography to safeguard sensitive data. By the end of the course, learners can create robust and secure desktop applications that protect against cyberattacks.

Location and Pricing

Accelebrate offers instructor-led enterprise training for groups of 3 or more online or at your site. Most Accelebrate classes can be flexibly scheduled for your group, including delivery in half-day segments across a week or set of weeks. To receive a customized proposal and price quote for private corporate training on-site or online, please contact us.

In addition, some courses are available as live, instructor-led training from one of our partners.

Objectives

  • Understand fundamental cyber security concepts and threats
  • Apply input validation techniques to mitigate injection attacks
  • Identify and prevent integer handling vulnerabilities
  • Securely handle files and streams to avoid path traversal attacks
  • Implement robust authentication and password management strategies
  • Utilize cryptography to protect data confidentiality and integrity
  • Recognize and address common software security weaknesses related to time, state, and errors

Prerequisites

All Python Security training students must have general Python development experience.

Outline

Expand All | Collapse All

Introduction to Cyber Security
  • What is security?
  • Threat and risk
  • Cyber security threat types – the CIA triad
  • Cyber security threat types – the STRIDE model
  • Consequences of insecure software
Input Validation
  • Input validation principles
  • Denylists and allowlists
  • What to validate – the attack surface
  • Where to validate – defense in depth
  • When to validate – validation vs transformations
  • Validation with regex
  • Regular expression denial of service (ReDoS)
  • Dealing with ReDoS
Injection
  • Injection principles
  • Injection attacks
  • SQL injection
  • Code injection
Integer Handling Problems
  • Representing signed numbers
  • Integer visualization
  • Integers in Python
  • Integer overflow
  • Integer overflows in ctypes and numpy
Files and Streams
  • Path traversal
  • Additional challenges in Windows
  • Path traversal best practices
Security Features
  • Authentication
  • Password management
  • Information exposure
Platform Security
  • Python platform security
Using Vulnerable Components
  • Assessing the environment
  • Hardening
  • Malicious packages in Python
  • Vulnerability management
Cryptography for Developers
  • Cryptography basics
  • Cryptography in Python
  • Elementary algorithms
  • Confidentiality protection
  • Integrity protection
  • Public Key Infrastructure (PKI)
Time and State
  • Race conditions
Errors
  • Error and exception handling principles
  • Exception handling
Wrap Up
  • Secure coding principles
  • And now what?
Conclusion

Training Materials

All attendees receive comprehensive courseware.

Software Requirements

Attendees will not need to install any software on their computers for this class. The class will be conducted in a remote environment that Accelebrate will provide; students will only need a local computer with a web browser and a stable Internet connection. Any recent version of Microsoft Edge, Mozilla Firefox, or Google Chrome will work well.



Learn faster

Our live, instructor-led lectures are far more effective than pre-recorded classes

Satisfaction guarantee

If your team is not 100% satisfied with your training, we do what's necessary to make it right

Learn online from anywhere

Whether you are at home or in the office, we make learning interactive and engaging

Multiple Payment Options

We accept check, ACH/EFT, major credit cards, and most purchase orders



Recent Training Locations

Alabama

Birmingham

Huntsville

Montgomery

Alaska

Anchorage

Arizona

Phoenix

Tucson

Arkansas

Fayetteville

Little Rock

California

Los Angeles

Oakland

Orange County

Sacramento

San Diego

San Francisco

San Jose

Colorado

Boulder

Colorado Springs

Denver

Connecticut

Hartford

DC

Washington

Florida

Fort Lauderdale

Jacksonville

Miami

Orlando

Tampa

Georgia

Atlanta

Augusta

Savannah

Hawaii

Honolulu

Idaho

Boise

Illinois

Chicago

Indiana

Indianapolis

Iowa

Cedar Rapids

Des Moines

Kansas

Wichita

Kentucky

Lexington

Louisville

Louisiana

New Orleans

Maine

Portland

Maryland

Annapolis

Baltimore

Frederick

Hagerstown

Massachusetts

Boston

Cambridge

Springfield

Michigan

Ann Arbor

Detroit

Grand Rapids

Minnesota

Minneapolis

Saint Paul

Mississippi

Jackson

Missouri

Kansas City

St. Louis

Nebraska

Lincoln

Omaha

Nevada

Las Vegas

Reno

New Jersey

Princeton

New Mexico

Albuquerque

New York

Albany

Buffalo

New York City

White Plains

North Carolina

Charlotte

Durham

Raleigh

Ohio

Akron

Canton

Cincinnati

Cleveland

Columbus

Dayton

Oklahoma

Oklahoma City

Tulsa

Oregon

Portland

Pennsylvania

Philadelphia

Pittsburgh

Rhode Island

Providence

South Carolina

Charleston

Columbia

Greenville

Tennessee

Knoxville

Memphis

Nashville

Texas

Austin

Dallas

El Paso

Houston

San Antonio

Utah

Salt Lake City

Virginia

Alexandria

Arlington

Norfolk

Richmond

Washington

Seattle

Tacoma

West Virginia

Charleston

Wisconsin

Madison

Milwaukee

Alberta

Calgary

Edmonton

British Columbia

Vancouver

Manitoba

Winnipeg

Nova Scotia

Halifax

Ontario

Ottawa

Toronto

Quebec

Montreal

Puerto Rico

San Juan