Course Outline

  • understand the web Threats and Attack Vectors
  • know the Secure Design Principles
  • understand OWASP Top 10 attacks 
  • understand the Authentication and Authorization problems
  • know how to prevent Cross-Site Scripting
  • know how to prevent Cross-Site Request Forgery
  • understand the secure Development Cycle
  • know how to prevent Injection Attacks
  • understand the protections in JDBC and JPA
  • understand the Penetration Testing methodologies
  • Know how to secure Java Applications

Requirements

  • Experience with Java.
  • Experience of creating web applications.
  21 Hours
 

Testimonials (4)

Related Courses

Related Categories