Java and Web Application Security

Writing web applications in Java can be rather complex – reasons range from dealing with legacy technologies or underdocumented third-party components to sharp deadlines and code maintainability. Yet, beyond all that, what if we told you that attackers were trying to break into your code right now? How likely would they be to succeed?

Interested in attending? Have a suggestion about running this event near you?
Register your interest now

Description

This course will change the way you look at your Java code. We'll teach you the common weaknesses and their consequences that can allow hackers to attack your system, and – more importantly – best practices you can apply to protect yourself. We cover typical Web vulnerabilities with a focus on how they affect Java web apps on the entire stack – from the Java runtime environment to modern AJAX and HTML5-based frontends. In addition, we discuss the security aspects of the Java platform itself as well as typical Java programming mistakes you need to be aware of. We present the entire course through live practical exercises to keep it engaging and fun.

Writing secure code will give you a distinct edge over your competitors. It is your choice to be ahead of the pack – take a step and be a game-changer in the fight against cybercrime.

Outline

  • IT security and secure coding
  • Injections
  • Auth
  • Some Frontend vulnerabilities
  • Race conditions
  • Java security
  • Spring security
  • Principles of security and secure coding
  • Knowledge sources
  • Participants attending this course will
  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn about XML security
  • Learn client-side vulnerabilities and secure coding practices
  • Learn to use various security features of the Java development environment
  • Get information about common vulnerabilities in the Java framework
  • Get sources and further readings on secure coding practices

Detailed table of contents

Day 1

  • IT security and secure coding
  • Prioritizing, measuring
  • Some trivial(?) vulnerabilities
  • Injections
  • Cross-Site Scripting (XSS)
  • Other HTML/CSS injections
  • Auth
  • Business-logic vulnerabilities
  • File related vulnerabilities
  • URL related vulnerabilities

Day 2

  • Cross-site vulnerabilities
  • XXE
  • Frontend vulnerabilities
  • Race conditions
  • HTML security attributes
  • Java security

Day 3

  • Handling numbers
  • Strings
  • Spring security
  • Security testing and vulnerability management
  • Principles of security and secure coding
  • Knowledge sources

Audience

Developers

Prerequisites

General Java development

Subscribe to Newsletter

Enter your email address to register to our newsletter subscription delivered on regular basis! 

CONTACT US     ABOUT     PRIVACY   BLOG

© Copyright GTP Computrain, Limited 2025