Advanced .NET Framework 2.0 Using C#: Vol 1, Part 5 of 5
Interactive

Advanced .NET Framework 2.0 Using C#: Vol 1, Part 5 of 5

LearnNow Online
Updated Oct 26, 2018

Course description

In this volume, you’ll learn about implementing service processes and application domains in your .NET applications using the System and ServiceProcess namespaces. You’ll see how to take advantage of multi-threading to create fast and efficient processes through the Threading namespace. You’ll learn how to internationalize your .NET application by using the globalization classes. Enhance your user interface with the System.Drawing and System.Text namespaces.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Meet the expert

Don Kiely

Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.

Video Runtime

187 Minutes

Time to complete

227 Minutes

Course Outline

Module 7

Windows Security (22:16)

  • Introduction (01:47)
  • DACLs / SACLs (05:18)
  • Effective Permissions (02:42)
  • Explore DACLs / SACLs (07:18)
  • Access Control (01:06)
  • Classes/Enumerations (01:18)
  • Access/Audit Rule Classes (02:00)
  • Summary (00:45)

Access Audit Rules (34:26)

  • Introduction (00:52)
  • Run Access Control Demo (03:57)
  • View Access Control Code (06:45)
  • Retrieve Access Rules (00:27)
  • Retrieve Security Info (04:21)
  • Retrieve Audit Rules (00:34)
  • Get Rules for Directories (01:03)
  • Get Rules for Registry (03:00)
  • Change Access Rules (00:18)
  • Allowing Access (03:54)
  • Denying Access (01:45)
  • Removing Access (03:26)
  • Change Audit Rules (01:27)
  • AuditFlags.None value (01:36)
  • Summary (00:57)

Low Level Security (25:43)

  • Introduction (01:28)
  • ACL / ACE Classes (03:00)
  • CommonSecurityDescriptor (05:10)
  • Ownership (02:03)
  • Securing New Objects (05:56)
  • Access Object Ownership (02:56)
  • Inheritance/Propagation (01:55)
  • Inheritance/Prop. Demo (00:42)
  • SetAccessRuleProtection (01:50)
  • Summary (00:39)
Module 8

Cryptography (47:09)

  • Introduction (01:57)
  • Cryptography Overview (02:25)
  • Protection Issues (04:07)
  • Algorithms (04:22)
  • Block Padding (02:19)
  • Cryptography in .NET (05:42)
  • Hashing Data (04:38)
  • Hashing Algorithms (01:30)
  • Algorithm Characteristics (01:28)
  • .NET Framework Classes (00:56)
  • Cryptography Demo (03:18)
  • Hashing Code (03:37)
  • Hashing a File (01:23)
  • Validate the Hash (04:02)
  • Compare Hash Codes (01:39)
  • CryptoConfig Object (01:07)
  • Key Hashing Algorithm (01:07)
  • Summary (01:24)

Encryption (32:07)

  • Introduction (01:39)
  • Symmetric Key Encryption (02:42)
  • Algorithms (02:11)
  • Algorithm Characteristics (01:10)
  • Symmetric in .NET (00:33)
  • Symmetric Key Demo (01:03)
  • Symmetric Key Code (03:11)
  • Encrypt/Decrypt Data (05:27)
  • Encrypt/Decrypt w/3DES (04:11)
  • Asymmetric Key Encryption (03:09)
  • RSA Algorithm (00:20)
  • Asymmetric in .NET (00:51)
  • Asymmetric Key Demo (01:08)
  • Asymmetric Key Code (03:39)
  • Summary (00:42)

Digital Sigs and DPAPI (25:40)

  • Introduction (01:41)
  • Digital Signature Hierarchy (00:45)
  • Digital Signature Demo (01:16)
  • Digital Signature Code (04:37)
  • Data Protection API (DPAPI) (03:23)
  • The DPAPI Process (02:23)
  • Store Options (01:50)
  • ProtectedMemory Class (01:51)
  • ProtectedData Class (00:59)
  • Protect Memory Demo (00:23)
  • Protect Data Demo (00:15)
  • Protect Memory Code (02:37)
  • Protect Data Code (02:45)
  • Summary (00:47)
;