×

Securing Java Web Applications

Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare+
Duration

2h 25m

level

Intermediate

Course Creator

Josh Cummings

Last Updated

03-Nov-20

This course focuses on detection and mitigation of the input validation family of vulnerabilities, which can steal data, take control of servers, and cause havoc. You’ll know how to be prepared to arm your application with the appropriate defense.

Add your review

Is your site being hacked right now? How do you know? Where are the security holes in your Java web applications, waiting to be exploited? Security breaches are one of the biggest risks for business today. Fortunately, many attacks are well-known and follow common patterns. In this course, Securing Java Web Applications, you’ll learn the top major input validation exploits as identified by OWASP, how they can be exploited in Java web applications, and how they can be corrected. First, you’ll explore cross-site scripting and log injection. Next, you’ll dive into understanding cross-site request forgery. Finally, you’ll finish the course by covering malicious file upload. By the end of this course, you’ll have the necessary skills and knowledge to make your code more secure.
Author Name: Josh Cummings
Author Description:
Like many software craftsmen, Josh eats, sleeps, and dreams in code. He codes for fun, and his kids code for fun! Right now, Josh works as a full-time committer on Spring Security and loves every minute. Hailing from Salt Lake City, Utah, Josh loves to hike and be in the outdoors when he’s not hacking away at some new Java library. He also loves to juggle, especially on every third Saturday in June. Application Security holds a special place in his heart, a place diametrically opposed to and cos… more

Table of Contents

  • Course Overview
    1min
  • How Many Vulnerabilities Can You Spot?
    10mins
  • Preventing Cross-site Scripting Attacks
    30mins
  • Preventing Log Injection and Log Forgery
    13mins
  • Preventing CSRF, Response Splitting, and Open Redirect
    36mins
  • Preventing Directory Traversal and Malicious File Upload
    22mins
  • Preventing SQL and NoSQL Injection
    19mins
  • Building in Security First
    10mins

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “Securing Java Web Applications”

Your email address will not be published. Required fields are marked *

Securing Java Web Applications
Securing Java Web Applications
Edcroma
Logo
Compare items
  • Total (0)
Compare
0
https://login.stikeselisabethmedan.ac.id/produtcs/
https://hakim.pa-bangil.go.id/
https://lowongan.mpi-indonesia.co.id/toto-slot/
https://cctv.sikkakab.go.id/
https://hakim.pa-bangil.go.id/products/
https://penerimaan.uinbanten.ac.id/
https://ssip.undar.ac.id/
https://putusan.pta-jakarta.go.id/
https://tekno88s.com/
https://majalah4dl.com/
https://nana16.shop/
https://thamuz12.shop/
https://dprd.sumbatimurkab.go.id/slot777/
https://dprd.sumbatimurkab.go.id/
https://cctv.sikkakab.go.id/slot-777/
https://hakim.pa-kuningan.go.id/
https://hakim.pa-kuningan.go.id/slot-gacor/
https://thamuz11.shop/
https://thamuz15.shop/
https://thamuz14.shop/
https://ppdb.smtimakassar.sch.id/
https://ppdb.smtimakassar.sch.id/slot-gacor/
slot777
slot dana
majalah4d
slot thailand
slot dana
rtp slot
toto slot
slot toto
toto4d
slot gacor
slot toto
toto slot
toto4d
slot gacor
tekno88
https://lowongan.mpi-indonesia.co.id/
https://thamuz13.shop/
https://www.alpha13.shop/
https://perpustakaan.smkpgri1mejayan.sch.id/
https://perpustakaan.smkpgri1mejayan.sch.id/toto-slot/
https://nana44.shop/
https://sadps.pa-negara.go.id/
https://sadps.pa-negara.go.id/slot-777/
https://peng.pn-baturaja.go.id/
https://portalkan.undar.ac.id/
https://portalkan.undar.ac.id/toto-slot/
https://penerimaan.ieu.ac.id/
https://sid.stikesbcm.ac.id/