Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- understand the web Threats and Attack Vectors
- know the Secure Design Principles
- understand OWASP Top 10 attacks
- understand the Authentication and Authorization problems
- know how to prevent Cross-Site Scripting
- know how to prevent Cross-Site Request Forgery
- understand the secure Development Cycle
- know how to prevent Injection Attacks
- understand the protections in JDBC and JPA
- understand the Penetration Testing methodologies
- Know how to secure Java Applications
Requirements
- Experience with Java.
- Experience of creating web applications.
21 Hours
Testimonials (4)
That we got a complex overview also about the context - for example why do we need some annotations and what they mean. I liked the practical part of the training - having to manually run the commands and call the rest api's
Alina - ACCENTURE SERVICES S.R.L
Course - Quarkus for Developers
the trainer can clearly explain the topic and can answer every question.
Hannah Mae Lubigan - Security Bank Corporation
Course - Advanced Spring Boot
All to topic actually including API
RODULFO ALMEDA JR - DATAWORLD COMPUTER CENTER
Course - Introduction to JavaServer Faces
The breadth of the topis covered was quite a bit and the trainer tried to do justice to that.