Java and Web Application Security
Scademy
Writing web applications in Java can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed? This course will change the way you look at your Java code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and – more importantly – best practices you can apply to protect yourself.
Who Should Attend
- Developers working with Java
- Web application developers using Java frameworks
- Security professionals securing Java applications
- Anyone responsible for building secure Java web applications
Prerequisites
- General Java development experience
What You Will Learn
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn about XML security
- Learn client-side vulnerabilities and secure coding practices
- Learn to use various security features of the Java development environment
- Get information about common vulnerabilities in the Java framework
- Get sources and further readings on secure coding practices
Course Outline
Labs & Practical Exercises
We cover typical Web vulnerabilities with a focus on how they affect Java web apps on the entire stack – from the Java runtime environment to modern AJAX and HTML5-based frontends. In addition, we discuss the security aspects of the Java platform itself as well as typical Java programming mistakes you need to be aware of. We present the entire course through live practical exercises to keep it engaging and fun.
Certification & Assessment
Certificate of Completion. Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack – take a step and be a game-changer in the fight against cybercrime.
