Description
Introduction
In this 2-hour course you will learn about using Code Access
Security in the Microsoft® .NET Framework 2.0. Topics range from
configuring Code Acess Security to managing Security Policy,
Permissions and Access Control, and User Identity. In the lab, you
will write code to configure security permissions for resources,
create GenericIdentity and GenericPrincipal objects, and perform
permission demands. Working with Code Access Security will allow
you to build secure applications that will be protected against
running malicious code and that will not allow unauthorized access
to data. This course also will help you prepare for Exam 70-536 TS:
Microsoft .NET Framework 2.0—Applicatio…
Read the complete description
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Introduction In this 2-hour course you will learn about using Code
Access Security in the Microsoft® .NET Framework 2.0. Topics range
from configuring Code Acess Security to managing Security Policy,
Permissions and Access Control, and User Identity. In the lab, you
will write code to configure security permissions for resources,
create GenericIdentity and GenericPrincipal objects, and perform
permission demands. Working with Code Access Security will allow
you to build secure applications that will be protected against
running malicious code and that will not allow unauthorized access
to data. This course also will help you prepare for Exam 70-536 TS:
Microsoft .NET Framework 2.0—Application Development Foundation.
Objectives At the end of the course, students will be able to:
- Configure Code Access Security
- Use the .NET Framework Configuration Tool
- Determine Assembly Permissions
- Manage Security Policy
- Configure security policy
- Use Policy classes
- Use Code Group classes
- Manage Code Group membership using Condition Types
- Create a custom Security Policy
- Manage Permissions
- Implement Permission Types using CodeAccessPermission
- Configure CAS Permissions
- Using Permission Set Classes
- Manage Access Control
- The Role of Access Control Base Types
- Use Access Control List Classes
- Protect Resources using Resource Security Classes
- Manage User Identity Information
- Use IIdentity and IPrincipal
- Manage User Identity with Generic Identity Classes
- Identify Windows Users with Windows Identity Classes
- Use Identity Reference Classes
- Impersonate a User with WindowsImpersonationContext
Modules & Lessons Course Overview Module Introduction
Navigation Overview Lab Information Course Information Implementing
Code Access Security Module Introduction Configuring Code Access
Security Lesson Introduction What Is Code Access Security?
Configuring Security by Using the .NET Framework Configuration Tool
Determine Assembly Permissions by Using Evidence Types Self Test
Managing Security Policy Lesson Introduction What Is a Security
Policy? Configure a Security Policy by Using the SecurityManager
Class Manage a Security Policy by Using Policy Classes Configure
Code Groups by Using Code Group Classes Manage Code Group
Membership by Using Condition Types Create a Custom Security Policy
by Using Security Policy Interfaces Self Test Managing Permissions
Lesson Introduction What Are Permissions? Implement Permission
Types by Using the CodeAccessPermission Class Configure Code Access
Security Permissions Manage Permission Groups by Using Permission
Set Classes Self Test Managing Access Control Lesson Introduction
The Role of Access Control Base Types Manage User Access to
Resources by Using Access Control List Classes Protect Resources by
Using Resource Security Classes Differentiating Between Access
Control Classes Self Test Managing User Identity Information Lesson
Introduction The Role of the IIdentity and IPrincipal Interfaces
Manage User Identity by Using Generic Identity Classes Identify
Windows Users by Using Windows Identity Classes Gather User
Identity Information by Using Identity Reference Classes
Impersonate a User Temporarily by Using WindowsImpersonationContext
Determining the Method to Gather User Identity Information Self
Test Lab: Implementing Code Access Security Lesson Introduction
Scenario Exercises Lab Review Module Summary Glossary Module
Introduction System Requirements To view this course, you need:
- A Pentium II, 256 MB RAM with a processor speed greater than or
equal to 400 MHZ
- Microsoft® Windows® 2000 or higher
- Microsoft Internet Explorer 6.0 or higher
- Adobe Flash 7.0 or higher (1MB disk space needed to
install)
- Microsoft Silverlight 4.0 or higher
- Microsoft Windows Media Player 7.0 or higher
- Microsoft XML Core Services 3.0 or higher
- A Super VGA monitor with minimum screen resolution 1024x768,
with 16-bit color.
- A sound card, and either speakers or headphones (for
multi-media audio).
- Internet bandwidth of 56K or faster. Broadband internet access
is recommended.
For courses containing Virtual Server-based labs (courses in the IT
Professional and Developer Catalog), you will need:
- Microsoft Virtual Server ActiveX control (1MB disk space needed
to install)
Test your computer's capabilities to see if it supports this
course. Accessibility Requirements The following software must be
running on your computer in order to access this course with Screen
Reader Software:
- Microsoft Internet Explorer 6.0 or higher
- Window-Eyes from GW Micro
- JAWS from Freedom Scientific
- MSAA enabled
There are no reviews yet. Share your review
Do you have experience with this course?
Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.