1. Introduction
2. Strong Authentication
3. Strong Authentication Demo
4. Strong Authentication Measures
5. Access Control
6. Demo Importance of Secured Access Control
7. Secure Configuration
8. Demo Secure Configuration - C#
9. Sensitive Data Protection
10. Sensitive Data Protection - C#
11. Serialization and Deserialization
12. Serialization and Deserialization Demo C#
13. Relying on Trusted Components
14. Demo Relying on Trusted Components - C#
15. Precise Logging And Monitoring
16. Precise Logging And Monitoring Demo C#
17. Server Side Request Validations
18. Injection And inclusion
19. SQL Injection - Demo
20. Other Things to be careful About