Get in Touch

Course Outline

  • Understand web threats and attack vectors.
  • Learn secure design principles.
  • Understand OWASP Top 10 attacks.
  • Understand challenges related to authentication and authorization.
  • Learn how to prevent Cross-Site Scripting.
  • Learn how to prevent Cross-Site Request Forgery.
  • Understand the secure development lifecycle.
  • Learn how to prevent injection attacks.
  • Understand security protections in JDBC and JPA.
  • Understand penetration testing methodologies.
  • Learn how to secure Java applications.

Requirements

  • Experience with Java.
  • Experience in developing web applications.
 21 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories