Course 3362: Implementing Code Access Security in the Microsoft .NET Framework 2.0

Product type

Course 3362: Implementing Code Access Security in the Microsoft .NET Framework 2.0

Microsoft Learning
Logo Microsoft Learning

Need more information? Get more details on the site of the provider.

Description

Introduction In this 2-hour course you will learn about using Code Access Security in the Microsoft® .NET Framework 2.0. Topics range from configuring Code Acess Security to managing Security Policy, Permissions and Access Control, and User Identity. In the lab, you will write code to configure security permissions for resources, create GenericIdentity and GenericPrincipal objects, and perform permission demands. Working with Code Access Security will allow you to build secure applications that will be protected against running malicious code and that will not allow unauthorized access to data. This course also will help you prepare for Exam 70-536 TS: Microsoft .NET Framework 2.0—Applicatio…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Introduction In this 2-hour course you will learn about using Code Access Security in the Microsoft® .NET Framework 2.0. Topics range from configuring Code Acess Security to managing Security Policy, Permissions and Access Control, and User Identity. In the lab, you will write code to configure security permissions for resources, create GenericIdentity and GenericPrincipal objects, and perform permission demands. Working with Code Access Security will allow you to build secure applications that will be protected against running malicious code and that will not allow unauthorized access to data. This course also will help you prepare for Exam 70-536 TS: Microsoft .NET Framework 2.0—Application Development Foundation. Objectives At the end of the course, students will be able to:
  • Configure Code Access Security
    • Use the .NET Framework Configuration Tool
    • Determine Assembly Permissions


  • Manage Security Policy
    • Configure security policy
    • Use Policy classes
    • Use Code Group classes
    • Manage Code Group membership using Condition Types
    • Create a custom Security Policy


  • Manage Permissions
    • Implement Permission Types using CodeAccessPermission
    • Configure CAS Permissions
    • Using Permission Set Classes


  • Manage Access Control
    • The Role of Access Control Base Types
    • Use Access Control List Classes
    • Protect Resources using Resource Security Classes


  • Manage User Identity Information
    • Use IIdentity and IPrincipal
    • Manage User Identity with Generic Identity Classes
    • Identify Windows Users with Windows Identity Classes
    • Use Identity Reference Classes
    • Impersonate a User with WindowsImpersonationContext
Modules & Lessons Course Overview Module Introduction Navigation Overview Lab Information Course Information Implementing Code Access Security Module Introduction Configuring Code Access Security Lesson Introduction What Is Code Access Security? Configuring Security by Using the .NET Framework Configuration Tool Determine Assembly Permissions by Using Evidence Types Self Test Managing Security Policy Lesson Introduction What Is a Security Policy? Configure a Security Policy by Using the SecurityManager Class Manage a Security Policy by Using Policy Classes Configure Code Groups by Using Code Group Classes Manage Code Group Membership by Using Condition Types Create a Custom Security Policy by Using Security Policy Interfaces Self Test Managing Permissions Lesson Introduction What Are Permissions? Implement Permission Types by Using the CodeAccessPermission Class Configure Code Access Security Permissions Manage Permission Groups by Using Permission Set Classes Self Test Managing Access Control Lesson Introduction The Role of Access Control Base Types Manage User Access to Resources by Using Access Control List Classes Protect Resources by Using Resource Security Classes Differentiating Between Access Control Classes Self Test Managing User Identity Information Lesson Introduction The Role of the IIdentity and IPrincipal Interfaces Manage User Identity by Using Generic Identity Classes Identify Windows Users by Using Windows Identity Classes Gather User Identity Information by Using Identity Reference Classes Impersonate a User Temporarily by Using WindowsImpersonationContext Determining the Method to Gather User Identity Information Self Test Lab: Implementing Code Access Security Lesson Introduction Scenario Exercises Lab Review Module Summary Glossary Module Introduction System Requirements To view this course, you need:
  • A Pentium II, 256 MB RAM with a processor speed greater than or equal to 400 MHZ
  • Microsoft® Windows® 2000 or higher
  • Microsoft Internet Explorer 6.0 or higher
  • Adobe Flash 7.0 or higher (1MB disk space needed to install)
  • Microsoft Silverlight 4.0 or higher
  • Microsoft Windows Media Player 7.0 or higher
  • Microsoft XML Core Services 3.0 or higher
  • A Super VGA monitor with minimum screen resolution 1024x768, with 16-bit color.
  • A sound card, and either speakers or headphones (for multi-media audio).
  • Internet bandwidth of 56K or faster. Broadband internet access is recommended.
For courses containing Virtual Server-based labs (courses in the IT Professional and Developer Catalog), you will need:
  • Microsoft Virtual Server ActiveX control (1MB disk space needed to install)
Test your computer's capabilities to see if it supports this course. Accessibility Requirements The following software must be running on your computer in order to access this course with Screen Reader Software:
  • Microsoft Internet Explorer 6.0 or higher
  • Window-Eyes from GW Micro
  • JAWS from Freedom Scientific
  • MSAA enabled
There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.