Course description
Web Application Security in Java
Your Web application written in Java works as intended, so you are done, right? But did you consider feeding in incorrect values? 16Gbs of data? A null? An apostrophe? Negative numbers, or specifically -232? Because that’s what the bad guys will do – and the list is far from complete.
Handling security needs a healthy level of paranoia, and this is what this course provides: a strong emotional engagement by lots of hands on labs and stories from real life, all to substantially improve code hygiene. Mistakes, consequences and best practices are our blood, sweat and tears.
The curriculum goes through the common Web application security issues following the OWASP Top Ten but goes far beyond it both in coverage and the details.
All this is put in the context of Java, and extended by core programming issues, discussing security pitfalls of the Java language and framework.
So that you are prepared for the forces of the dark side.
So that nothing unexpected happens.
Nothing.
This training is available for corporate teams and can be offered virtually to suit your company's needs. Get in touch to learn more!
Do you work at this organisation and want to update this page?
Is there out-of-date information about your organisation or courses published here? Fill out this form to get in touch with us.
Upcoming start dates
Suitability - Who should attend?
Prerequisites: General Java and Web development skills
Training Course Content
- Getting familiar with essential cybersecurity concepts
- Understanding Web application security issues
- Detailed analysis of the OWASP Top Ten elements
- Putting Web application security in the context of Java
- Going beyond the low hanging fruits
- Handling security challenges in your Java code
- Identify vulnerabilities and their consequences
- Learn the security best practices in Java
Reviews
Average rating 5
The content went very deep into secure coding practices, way beyond my expectation.
The platform is very entertaining, holds your hand through the learning process.
I have been coding for 15 years and never thought I would still come across such important security cornerstones.