Thank you for sending your enquiry! One of our team member will contact you shortly.
Thank you for sending your booking! One of our team member will contact you shortly.
Course Outline
- understand the web Threats and Attack Vectors
- know the Secure Design Principles
- understand OWASP Top 10 attacks
- understand the Authentication and Authorization problems
- know how to prevent Cross-Site Scripting
- know how to prevent Cross-Site Request Forgery
- understand the secure Development Cycle
- know how to prevent Injection Attacks
- understand the protections in JDBC and JPA
- understand the Penetration Testing methodologies
- Know how to secure Java Applications
Requirements
- Experience with Java.
- Experience of creating web applications.
Testimonials
The OWASP overview, especially slides with the specific examples of attacks. OWASP Zap tool.
- Corvil
I saw some security risk being easier to use than I expected It helped us to find some security holes in our Product
- Corvil
Related Courses
Advanced Spring Boot
14 hours
Apache Camel and Spring Boot
14 hours
Spring Boot for Beginners
14 hours
SpringBootBasic
21 hours
Introduction to Apache Struts 2
14 hours
Guava
21 hours
Jakarta EE Fundamentals
28 hours
Introduction to JavaServer Faces
14 hours
Learning Gradle
14 hours
NetBeans
14 hours
OpenXava
14 hours
Quarkus for Developers
14 hours
Spring Boot, React, and Redux
14 hours
Vaadin
14 hours