Twee collega's hebben een fysieke meeting op kantoor
 2.100,00 ex. VAT No extra costs

In recent years, secure coding has become one of the most important focal points in application development. This training helps you to make your Java code ready for security audits.

Spoken language
English
Language material
English
Half-days
3
Software Engineering

Secure coding in Java (EN)

The course is not scheduled in our open calendar. Please fill in your details below and we will contact you within 2 working days.

"*" indicates required fields

Hidden
Hidden
Hidden

What is Secure coding in Java

Contents

– Secure coding in Java means writing Java code that is free from the most common security risks.

– In application development security requirements play an important role in all parts of the process. Some of these requirements must be handled by Java developers. It is therefore important to be able to identify those components that may a pose higher risk and to be able to mitigate these risks by using proven solutions (i.e. from the OWASP site).

– By the end of this course participants will be able to:

– • Identify code components that may be subject to security weaknesses.

– • Mitigate security risks by using proven solutions.

– • Build a Java web application that is protected against most common security threats.


Who should attend Secure coding in Java

Any Java developer who contributes to building a Java web application where risk mitigation is an important requirement.


Prerequisites

Java developer

During this training you need a laptop on which you can install software: IntelliJ IDEA – The Leading Java and Kotlin IDE (https://www.jetbrains.com/idea/download).


Objectives

• The participant can explain the benefits of security

• The participant can explain the importance of using SSD

• The participant can explain why companies need to comply to security standards

• The participant can explain the concept of RSA encryption

• The participant can explain the use of SSL

• The participant can explain the concept of certificates in SSL

• The participant can explain the use of certificates for website identification

• The participant can explain the use of certificates for signing content

• The participant can generate a self-signed certificate

• The participant can explain and implement the concept of hashing

• The participant can explain the difference between hashing and encryption

• The participant can explain the need for GDPR and identify GDPR sensitive data

• The participant can explain why companies need to comply to GDPR

• The participant can use the OWASP site for identifying security vulnerabilities and risks

• The participant is familiar with the top 10 vulnerabilities on the OWASP site

• The participant can explain the concept of injection attacks

• The participant can explain the concept of sanitizing user input

• The participant can explain the concept of xss attacks

• The participant can explain the concept of xxe attacks

• The participant can explain the concept and use of security headers to prevent attacks

• The participant can explain the concept of basic authentication

• The participant can implement basic authentication

• The participant can explain the concept of form based authentication

• The participant can implement form based authentication

• The participant can explain the concept of authorization

• The participant can implement authorization

• The participant can explain the concept of OAuth 2

• The participant can implement OAuth 2

• The participant can explain the concept of a csrf token

• The participant can implement to use of a csrf token

• The participant can explain the concept of an IDP

• The participant can explain the concept of a JWT

• The participant can implement a JWT

• The participant can explain the importance of logging security related events

• The participant can explain the importance of NOT logging GDPR related events

To participate in this training, you should bring your own laptop and be able to install software on it.


Classroom, online, blended and in-company

At Capgemini Academy you learn in the way that suits you. Do you prefer classroom training, online or a combination of the two (blended)? You can follow most training courses in-company: within your own organization. We use a variety of tools to make learning even more fun and effective. Consider videos, games, quizzes, webinars and case studies, for example. And you can always contact your trainer with any questions.

Sfeerbeeld buiten met man in bordeaux overhemd

In-company training courses

With an in-company training you have several advantages:

  • You choose the location.
  • You train with your colleagues, ensuring it aligns with your practice.
  • The trainer tailors explanations, examples and assignments to your organization.
  • In consultation, exercises can be adapted to organization-specific questions.

Request more information or a quote.

Why Capgemini Academy?

  • checkmark wit
    Part of one of the largest, most innovative IT service providers worldwide.
  • checkmark wit
    Large training offer: both fully online and available in class.
  • checkmark wit
    Most training courses include certification and exam.
  • checkmark wit
    Trainers with passion, didactic skills and a good dose of practical experience as an IT professional.
  • checkmark wit
    Our students rate our training courses with an average of 8.8.