Secure coding in Java (EN)
The course is not scheduled in our open calendar. Please fill in your details below and we will contact you within 2 working days.
"*" indicates required fields
What is Secure coding in Java
Contents
– Secure coding in Java means writing Java code that is free from the most common security risks.
– In application development security requirements play an important role in all parts of the process. Some of these requirements must be handled by Java developers. It is therefore important to be able to identify those components that may a pose higher risk and to be able to mitigate these risks by using proven solutions (i.e. from the OWASP site).
– By the end of this course participants will be able to:
– • Identify code components that may be subject to security weaknesses.
– • Mitigate security risks by using proven solutions.
– • Build a Java web application that is protected against most common security threats.
Who should attend Secure coding in Java
Any Java developer who contributes to building a Java web application where risk mitigation is an important requirement.
Prerequisites
Java developer
During this training you need a laptop on which you can install software: IntelliJ IDEA – The Leading Java and Kotlin IDE (https://www.jetbrains.com/idea/download).
Objectives
• The participant can explain the benefits of security
• The participant can explain the importance of using SSD
• The participant can explain why companies need to comply to security standards
• The participant can explain the concept of RSA encryption
• The participant can explain the use of SSL
• The participant can explain the concept of certificates in SSL
• The participant can explain the use of certificates for website identification
• The participant can explain the use of certificates for signing content
• The participant can generate a self-signed certificate
• The participant can explain and implement the concept of hashing
• The participant can explain the difference between hashing and encryption
• The participant can explain the need for GDPR and identify GDPR sensitive data
• The participant can explain why companies need to comply to GDPR
• The participant can use the OWASP site for identifying security vulnerabilities and risks
• The participant is familiar with the top 10 vulnerabilities on the OWASP site
• The participant can explain the concept of injection attacks
• The participant can explain the concept of sanitizing user input
• The participant can explain the concept of xss attacks
• The participant can explain the concept of xxe attacks
• The participant can explain the concept and use of security headers to prevent attacks
• The participant can explain the concept of basic authentication
• The participant can implement basic authentication
• The participant can explain the concept of form based authentication
• The participant can implement form based authentication
• The participant can explain the concept of authorization
• The participant can implement authorization
• The participant can explain the concept of OAuth 2
• The participant can implement OAuth 2
• The participant can explain the concept of a csrf token
• The participant can implement to use of a csrf token
• The participant can explain the concept of an IDP
• The participant can explain the concept of a JWT
• The participant can implement a JWT
• The participant can explain the importance of logging security related events
• The participant can explain the importance of NOT logging GDPR related events
To participate in this training, you should bring your own laptop and be able to install software on it.
Classroom, online, blended and in-company
At Capgemini Academy you learn in the way that suits you. Do you prefer classroom training, online or a combination of the two (blended)? You can follow most training courses in-company: within your own organization. We use a variety of tools to make learning even more fun and effective. Consider videos, games, quizzes, webinars and case studies, for example. And you can always contact your trainer with any questions.
In-company training courses
With an in-company training you have several advantages:
- You choose the location.
- You train with your colleagues, ensuring it aligns with your practice.
- The trainer tailors explanations, examples and assignments to your organization.
- In consultation, exercises can be adapted to organization-specific questions.
Request more information or a quote.