Course Outline

  • understand the web Threats and Attack Vectors
  • know the Secure Design Principles
  • understand OWASP Top 10 attacks 
  • understand the Authentication and Authorization problems
  • know how to prevent Cross-Site Scripting
  • know how to prevent Cross-Site Request Forgery
  • understand the secure Development Cycle
  • know how to prevent Injection Attacks
  • understand the protections in JDBC and JPA
  • understand the Penetration Testing methodologies
  • Know how to secure Java Applications

Requirements

  • Experience with Java.
  • Experience of creating web applications.
 21 Hours

Number of participants



Price per participant

Testimonials (2)

Related Courses

NetBeans

14 Hours

Guava

21 Hours

Vaadin

14 Hours

Enterprise Application Integrations with Spring Integration

14 Hours

Jakarta EE Fundamentals

28 Hours

Quarkus for Developers

14 Hours

Introduction to Apache Struts 2

14 Hours

Learning Gradle

14 Hours

Introduction to JavaServer Faces

14 Hours

OpenXava

14 Hours

Advanced Spring Boot

14 Hours

Angular and Spring Boot

14 Hours

Apache Camel and Spring Boot

14 Hours

Building Microservices with Spring Boot, Docker, and Kubernetes

21 Hours

Spring Boot, React, and Redux

14 Hours

Related Categories

1