Securing Java Web Applications Through Authentication
Your users’ usernames and passwords are the keys to the kingdom. Watch and apply this course in order to approach authenticating and managing secure data in Java web applications with greater confidence.
How long would your users’ usernames and passwords survive an attack? In this course, Security Java Web Applications Using Authentication, you will gain the ability to detect and mitigate authentication vulnerabilities. First, you will detect enumeration vulnerabilities. Next, you will find brute force ones. Then, in plaintext. Finally, you will explore how to securely log in order to detect attacks at runtime. When you’re finished with this course, you will have the Application Security skills and knowledge needed to securely authenticate users.
Author Name: Josh Cummings
Author Description:
Like many software craftsmen, Josh eats, sleeps, and dreams in code. He codes for fun, and his kids code for fun! Right now, Josh works as a full-time committer on Spring Security and loves every minute. Hailing from Salt Lake City, Utah, Josh loves to hike and be in the outdoors when he’s not hacking away at some new Java library. He also loves to juggle, especially on every third Saturday in June. Application Security holds a special place in his heart, a place diametrically opposed to and cos… more
Table of Contents
- Course Overview
1min - Introduction
7mins - Identifying and Mitigating Enumeration Vulnerabilities
18mins - Identifying and Mitigating Brute Force Vulnerabilities
26mins - Identifying and Mitigating Plaintext Vulnerabilities in Transit
28mins - Identifying and Mitigating Plaintext Vulnerabilities at Rest
36mins - Creating an Audit Trail for Security Events
21mins
There are no reviews yet.