Duration: 5 days
40 PDUs, 4 CEUs
Lab hours included.
This course shows Java web developers how to secure their applications and to apply best practices with regard to secure enterprise coding. Authentication, authorization, and input validation are major themes, and students get good exposure to basic Java cryptography for specific development scenarios, as well as thorough discussions of HTTPS configuration and certificate management, error handling, logging, and auditing. Perhaps the most eye-opening parts of the course concern common web "hacks," or attack vectors. Students see how easy it is to leave an application unguarded against cross-site scripting (XSS), cross-site request forgery (CSRF), SQL injection, and other attack types -- and learn that it's also easy to fix such vulnerabilities and the importance of a secure development process.
• Generally, be prepared to develop secure Java web applications, or to secure existing applications by refactoring as necessary.
• Define security constraints and login configurations that instruct the web container to enforce authentication and authorization policies.
• Guard against common web attacks including XSS, CSRF, and SQL injection.
• Validate user input aggressively, for general application health and specifically to foil injection and XSS attacks.
• Configure a server and/or application to use one-way or two-way HTTPS.
• Apply application-level cryptography where necessary.
• Store sensitive information securely, hash user passwords, and understand the importance of salting and of using slow hashing algorithms and processes, to maximize the safety of stored credentials.
• Secure log files and establish audit trails for especially sensitive information or actions.
Method of Delivery
• Onsite/Live class instructions or Online web conference
• Open discussion
• Case studies