Java and Web Application Security

SEC-124 (3 Days)

Request Pricing

Security Training Overview

Accelebrate's Java and Web Application Security Training teaches developers common security vulnerabilities in Java applications and how to write hardened, more secure code. Attendees learn the OWASP Top Ten and typical Web vulnerabilities with a focus on how these issues affect Java web apps across the entire stack.

Location and Pricing

Most Accelebrate courses are taught as private, customized training for 3 or more attendees at our clients' sites worldwide. In addition, we offer live, private online classes for teams who may be in multiple locations or wish to save on travel costs. Please visit our client list for organizations for whom we have delivered onsite training. To receive a customized proposal and price quote for private on-site or online training, please contact us.

Security Training Objectives

All attendees will:

  • Gain an understanding of Web application security issues
  • Analyze the OWASP Top Ten elements
  • Put Web application security in the context of Java
  • Go beyond the low hanging fruits
  • Handle security challenges in your Java code
  • Identify vulnerabilities and their consequences
  • Learn the security best practices in Java

Security Training Outline

Expand All | Collapse All | Printer-Friendly

Introduction
Cybersecurity Basics
  • What is security?
  • Threat and risk
  • Cybersecurity threat types
  • Consequences of insecure software
  • Constraints and the market
  • The dark side
  • Categorization of bugs
    • The seven pernicious kingdoms
    • SEI cert secure coding guidelines
The OWASP Top Ten (Part I)
  • OWASP Top 10 – 2017
  • Injection
    • Injection principles
    • Injection attacks
    • SQL injection
    • SQL injection best practices
    • Code injection
    • Injection best practices
  • Broken authentication
    • Authentication basics
    • Authentication weaknesses
    • Spoofing on the Web
    • Case study – PayPal 2FA bypass
    • Password management
    • Session management
The OWASP Top Ten (Part II)
  • Sensitive data exposure
    • Information exposure
    • Exposure through extracted data and aggregation
    • Case study – Strava fitness app data exposure
  • XML External Entities (XXE)
    • DTD and the entities
    • Entity expansion
    • External Entity Attack (XXE)
  • Broken access control
    • Access control basics
    • Failure to restrict URL access
    • Confused deputy
  • File upload
    • Unrestricted file upload
    • Good practices
  • Security misconfiguration
    • Configuration principles
    • Configuration management
    • Java-related components – best practices
  • Cross-site Scripting (XSS)
    • Cross-site scripting basics
    • Cross-site scripting types
  • XSS protection best practices
    • Protection principles – escaping
    • XSS protection APIs in Java
    • XSS protection in JSP
    • Additional protection layers
  • Insecure deserialization
    • Serialization and deserialization challenges
    • Deserializing untrusted streams
    • Deserializing best practices
    • Using ReadObject
    • Sealed objects
    • Look ahead deserialization
    • Property Oriented Programming (POP)
  • Using components with known vulnerabilities
    • Using vulnerable components
    • Untrusted functionality import
    • Importing JavaScript
    • Case study – The British Airways data breach
    • Vulnerability management
  • Insufficient logging & monitoring
    • Logging and monitoring principles
    • Insufficient logging
    • Plaintext passwords at Facebook
    • Logging best practices
    • OWASP security logging library for Java
  • Web application security beyond the Top Ten
    • Client-side security
    • Tabnabbing
    • Frame sandboxing
Common Software Security Weaknesses
  • Input validation
    • Integer handling problems
    • Other numeric problems
    • Unsafe reflection
    • Unsafe native code
  • Security features
    • Java platform security
  • Errors
    • Error and exception handling principles
    • Error handling
    • Exception handling
  • Code quality
    • Constructors and destructors
    • Class initialization cycles
    • Unreleased resource
    • The finalize() method – best practices
    • Object-oriented programming pitfalls
    • Serialization
Wrap Up
  • Secure coding principles
    • Principles of robust programming by Matt Bishop
    • Secure design principles of Saltzer and Schröder
  • And now what?
    • Further sources and readings
    • Java resources
Request Pricing
Lecture percentage

50%

Lecture/Demo

Lab percentage

50%

Lab

Course Number:

SEC-124

Duration:

3 Days

Prerequisites:

All students must have Java development experience.

Training Materials:

All Secure Coding training attendees receive comprehensive courseware.

Software Requirements:

A VirtualBox virtual machine with all required software will be provided.

Contact Us:

Accelebrate’s training classes are available for private groups of 3 or more people at your site or online anywhere worldwide.

Don't settle for a "one size fits all" public class! Have Accelebrate deliver exactly the training you want, privately at your site or online, for less than the cost of a public class.

For pricing and to learn more, please contact us.

Contact Us Train For Us

Toll-free in US/Canada:
877 849 1850
International:
+1 678 648 3113

Toll-free in US/Canada:
866 566 1228
International:
+1 404 420 2491

925B Peachtree Street, NE
PMB 378
Atlanta, GA 30309-3918
USA

Subscribe to our Newsletter:

Never miss the latest news and information from Accelebrate:

Microsoft Gold Partner

Please see our complete list of
Microsoft Official Courses

Recent Training Locations

Alabama

Huntsville

Montgomery

Birmingham

Alaska

Anchorage

Arizona

Phoenix

Tucson

Arkansas

Fayetteville

Little Rock

California

San Francisco

Oakland

San Jose

Orange County

Los Angeles

Sacramento

San Diego

Colorado

Denver

Boulder

Colorado Springs

Connecticut

Hartford

DC

Washington

Florida

Fort Lauderdale

Miami

Jacksonville

Orlando

Saint Petersburg

Tampa

Georgia

Atlanta

Augusta

Savannah

Idaho

Boise

Illinois

Chicago

Indiana

Indianapolis

Iowa

Ceder Rapids

Des Moines

Kansas

Wichita

Kentucky

Lexington

Louisville

Louisiana

Baton Rouge

New Orleans

Maine

Portland

Maryland

Annapolis

Baltimore

Hagerstown

Frederick

Massachusetts

Springfield

Boston

Cambridge

Michigan

Ann Arbor

Detroit

Grand Rapids

Minnesota

Saint Paul

Minneapolis

Mississippi

Jackson

Missouri

Kansas City

St. Louis

Nebraska

Lincoln

Omaha

Nevada

Reno

Las Vegas

New Jersey

Princeton

New Mexico

Albuquerque

New York

Buffalo

Albany

White Plains

New York City

North Carolina

Charlotte

Durham

Raleigh

Ohio

Canton

Akron

Cincinnati

Cleveland

Columbus

Dayton

Oklahoma

Tulsa

Oklahoma City

Oregon

Portland

Pennsylvania

Pittsburgh

Philadelphia

Rhode Island

Providence

South Carolina

Columbia

Charleston

Spartanburg

Greenville

Tennessee

Memphis

Nashville

Knoxville

Texas

Dallas

El Paso

Houston

San Antonio

Austin

Utah

Salt Lake City

Virginia

Richmond

Alexandria

Arlington

Washington

Tacoma

Seattle

West Virginia

Charleston

Wisconsin

Madison

Milwaukee

Alberta

Edmonton

Calgary

British Columbia

Vancouver

Nova Scotia

Halifax

Ontario

Ottawa

Toronto

Quebec

Montreal

Puerto Rico

San Juan

© 2013-2019 Accelebrate, Inc. All Rights Reserved. All trademarks are owned by their respective owners.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.