3 arrows

Summer-Ready Savings: Up To $500 Off Training 

closeClose

Secure Java Coding

  • Tuition USD $2,095 GSA  $1,899.75
  • Reviews star_rate star_rate star_rate star_rate star_half 4119 Ratings
  • Course Code TT8200-J
  • Duration 3 days
  • Available Formats Classroom

Java Secure Coding is a hands-on, lab-intensive Java security, code-level training course that teaches you the best practices for designing, implementing, and deploying secure programs in Java. You will take an application from requirements through to implementation, analyzing and testing for software vulnerabilities. This course explores well beyond basic programming skills, teaching you sound processes and practices to apply to the entire software development lifecycle. Perhaps just as significantly, you will learn about current, real examples that illustrate the potential consequences of not following these best practices. This course is short on theory and long on application, providing you with in-depth, code-level labs. The course also provides a solid foundation in basic terminology and concepts, extended and built upon throughout the engagement. You will examine various recognized attacks against web applications. Processes and best practices are discussed and illustrated through both discussions and group activities. This workshop is about 50% dynamic lab exercises and 50% lecture. The second portion of the course walks you through a series of vulnerabilities illustrating in very real terms the right way to implement secure web applications. The last portion of the course examines several design patterns that can be used to facilitate better application architecture, design, implementation, and deployment. You will leave the course armed with the required skills to recognize software vulnerabilities (actual and potential) and implement defenses for those vulnerabilities. A key component to our Secure Java Coding (TT8200-J)Best Defense IT Security Training Series, this workshop is a companion course with several developer-oriented courses and seminars. Although this edition of the course is Java-specific, it may also be presented using .Net or other programming languages.

  • According to research by the National Institute of Standards, 92% of all security vulnerabilities are now considered application vulnerabilities and not network vulnerabilities.

Skills Gained

  • Concepts and terminology behind defensive coding
  • Using Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets
  • Threats and attacks that take place against software applications in today's world
  • Using Threat Modeling to identify potential vulnerabilities in a real-life case study
  • Perform both static code reviews and dynamic application testing to uncover vulnerabilities in Java applications
  • Vulnerabilities of the Java programming language and the JVM as well as how to harden both
  • Work with Java 2 platform security to gain an appreciation for what is protected and how
  • Java Authentication and Authorization Service (JAAS) in Java applications
  • Using JAAS in conjunction with a Java application for both authentication and authorization
  • Basics of Java Cryptography (JCA) and Encryption (JCE) and where they fit in the overall security picture
  • Fundamentals of XML Digital Signature and XML Encryption

Who Can Benefit

This is an intermediate-level programming course designed for application project stakeholders who wish to get up and running on developing well-defended Java applications.

Prerequisites

  • Familiarity with the Java programming language is required, and real-world programming experience is highly recommended.
  • TT2101 Core Java programming (3 days) or TT2100 Java Programming Fundamentals for OO Developers (5 days) or TT2120 Java Programming Fundamentals for Non-OO Developers (C, COBOL, Mainframe) (5 days), or equivalent knowledge and skills

Course Details

Defensive Coding Overview

  • Thriving Industry of Identify Theft
  • Dishonor Roll of Data Breaches
  • TJX: Anatomy of a Disaster
  • Heartland: What? Again?
  • Terminology and Players
  • Assets, Threats, and Attacks
  • OWASP
  • CWE/SANS Top 25 Programming Errors
  • Categories
  • What They Mean to Your Applications
  • Security Is a Lifecycle Issue
  • Minimize Attack Surface
  • Manage Resources
  • Application States
  • Compartmentalize
  • Defense in Depth Layered Defense
  • Consider All Application States
  • Not Trusting the Untrusted
  • Security Defect Mitigation
  • Leverage Experience
  • Recent, Relevant Incidents
  • Find Security Defects in Web Application

Vulnerabilities

  • Security Attacks
  • Information Attacks
  • System Attacks
  • Data Attacks

Java Security Fundamentals

  • Perimeter Defenses
  • Java Security Architecture
  • JVM Defenses
  • Extending the Defenses

Cryptography Overview

  • Cryptography Defined
  • Strong Encryption
  • Ciphers and Algorithms
  • Message Digests
  • Keys and Key Management
  • Types of Keys
  • JCA and JCE
  • Key Management in Java
  • Certificate Management in Java
  • Encryption/Decryption

Code Location-Based Security

  • Java 2 Security and Applets
  • Work with Java 2 Security
  • Byte Code verifier
  • Class Loaders
  • Class Loader Tunnels
  • Signing Code
  • Trusted Code
  • Java permission Management
  • Extending Java Permissions

User-based J2SE Security

  • JAAS Overview
  • JAAS Authentication
  • Extending JAAS Authentication
  • JAAS Authorization

Java Network Security

  • SSL Support
  • HTTPS
  • GSS
  • SASL Protocols

Code Level Security Best Practices

  • What Java Security Provides For
  • Preventing Remote Hacking
  • Preventing Accessing of Restricted Resources
  • Retaining Credibility with Java Code

Defending XML Processing

  • Understanding Common Attacks and How To Defend
  • Operating in Safe Mode
  • Using Standards-Based Security
  • XML-Aware Security Infrastructure

When does class start/end?

Classes begin promptly at 9:00 am, and typically end at 5:00 pm.

Does the course schedule include a Lunchbreak?

Lunch is normally an hour long and begins at noon. Coffee, tea, hot chocolate and juice are available all day in the kitchen. Fruit, muffins and bagels are served each morning. There are numerous restaurants near each of our centers, and some popular ones are indicated on the Area Map in the Student Welcome Handbooks - these can be picked up in the lobby or requested from one of our ExitCertified staff.

How can someone reach me during class?

If someone should need to contact you while you are in class, please have them call the center telephone number and leave a message with the receptionist.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does ExitCertified deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

Does ExitCertified deliver group training?

Yes, we provide training for groups, individuals, and private on sites. View our group training page for more information.

The training was good but needed the basic skills of maximo before getting deep in the configuration of it.

The class was very vast paced however the teacher was very good at checking in on us while giving us time to complete the labs.

Instructor was great, course was mostly very good except for too much focus on pricing

Although there seemed to be too many links for the course, everything worked smoothly.

Great and very intuitive. Better than the traditional hit the wrong button/lose points.

0 options available

There are currently no scheduled dates for this course. If you are interested in this course, request a course date with the links above. We can also contact you when the course is scheduled in your area.

Contact Us 1-800-803-3948
Contact Us
FAQ Get immediate answers to our most frequently asked qestions. View FAQs arrow_forward