Secure Java EE Development


Course Number: JAV-404

Duration: 5 days (32.5 hours)

Format: Live, hands-on

Java EE 7 Security Training Overview

Accelebrate's Java EE 7 Security Training: Secure Java EE Development course shows experienced developers of Java EE applications and services how to write new code and upgrade existing code for maximum safety.

Location and Pricing

Accelebrate offers instructor-led enterprise training for groups of 3 or more online or at your site. Most Accelebrate classes can be flexibly scheduled for your group, including delivery in half-day segments across a week or set of weeks. To receive a customized proposal and price quote for private corporate training on-site or online, please contact us.

In addition, some courses are available as live, online classes for individuals. See a schedule of online courses.

Objectives

  • Develop secure Java web applications and services, or secure existing applications and services by refactoring as necessary.
  • Define security constraints and login configurations that instruct the web container to enforce authentication and authorization policies.
  • Guard against common web attacks including XSS, CSRF, and SQL injection.
  • Validate user input aggressively for general application health and specifically to foil injection and XSS attacks.
  • Configure a server and/or application to use one-way or two-way HTTPS.
  • Apply application-level cryptography where necessary.
  • Secure log files and establish audit trails for especially sensitive information or actions.
  • Use HMAC security as appropriate in RESTful web services.
  • Participate in SAML SSO systems and be aware of the security concerns involved in single sign-on.
  • Implement the server and client sides of the OAuth-2.0 initial flow in order to provide third-party authorization to resources in a secure manner.

Prerequisites

  • Java programming experience is essential - Accelebrate's Beginning Java Application Development is excellent preparation should students need to get up to speed on Java.
  • Servlets programming experience is required - Students should have taken Accelebrate's Beginning JSP and Servlets or have equivalent experience.
  • JSP page-authoring experience is recommended but not required. Again, consider Beginning JSP and Servlets.
  • Understanding of RESTful web services as implemented in JAX-RS will be highly beneficial, but is not strictly required. Consider Accelebrate's RESTful Web Services with JAX-RS course for your team.

Outline

Expand All | Collapse All

Introduction
Secure Web Applications
  • Threats and Attack Vectors
  • Server, Network, and Browser Vulnerabilities
  • Secure Design Principles
  • GET vs. POST
  • Container Authentication and Authorization
  • HTML Forms
  • Privacy Under /WEB-INF
  • HTTP and HTTPS
  • Other Cryptographic Practices
  • SOA and Web Services
  • The OWASP Top 10
Authentication and Authorization
  • HTTP BASIC and DIGEST Authentication Schemes
  • Declaring Security Constraints
  • User Accounts
  • Safeguarding Credentials in Transit
  • Replay Attacks
  • Authorization Over URL Patterns
  • Roles
  • FORM Authentication
  • Login Form Design
  • EJB Authorization
  • Programmatic Security
  • Programmatic Security in JSF
Common Web Attacks
  • Single Points of Decision
  • Cross-Site Scripting
  • Validation vs. Output Escaping
  • Forceful Browsing
  • Cross-Site Request Forgery
  • Request Tokens
  • Injection Attacks
  • Protections in JDBC and JPA
  • Session Management
  • Taking Care of Cookies
Input Validation
  • Validating User Input
  • Validation Practices
  • Regular Expressions
  • JSF Validation
  • Bean Validation (a/k/a JSR-303)
  • Constraint Annotations
  • Cross-Field Validation
  • Built-In Support in Java EE
  • Using a Validator
  • Producing Error Responses
HTTPS and Certificates
  • Digital Cryptography
  • Encryption
  • SSL and Secure Key Exchange
  • Hashing
  • Signature
  • Keystores
  • keytool
  • Why Keys Aren't Enough
  • X.509 Certificates
  • Certificate Authorities
  • Obtaining a Signed Certificate
  • Configuring HTTPS
  • Client-Side Certificates and Two-Way SSL
  • PKCS #12 and Trust Stores
  • CLIENT-CERT Authentication
Application-Level Cryptography
  • The Java Cryptography Architecture
  • Secure Random Number Generation
  • The KeyStore API
  • Digital Signature
  • Hashing
  • Password Hashing
  • Why Hashing Isn't Enough
  • Salts
  • Slow Algorithms
  • Key Lengthening and Key Strengthening
  • The Java Cryptography Extensions
  • The SecretKey and KeyGenerator Types
  • Symmetric Encryption
  • Choosing Algorithms and Key Sizes
  • Dangerous Practices
Secure Development Practices
  • Secure Development Cycle
  • Error Handling and Information Leakage
  • Failing to a Secure Mode
  • Logging Practices
  • Appropriate Content for Logs
  • Auditing
  • Strategies: Filters, Interceptors, and Command Chains
  • Penetration Testing
  • Back Doors
  • Secure Code Review
REST Security Basics
  • Security Concerns for REST Services
  • HTTPS
  • HTTP BASIC and DIGEST
  • Authorization by URL Pattern
  • Cross-Site Scripting
  • Injection Attacks
  • Cross-Site Request Forgery
  • Common Countermeasures
HMAC Security
  • Use Case: Message Authentication
  • Digital Signature
  • Hashing as Signature: the HMAC
  • Appropriate Salts
  • Canonicalization
  • Amazon S3
  • Timestamps
  • Signing and Verifying Messages
  • XML Cryptography and Canonicalization
  • Canonicalizing JSON
SAML SSO
  • Use Case: Single Sign-On
  • SAML Orientation
  • SAML Assertions
  • SAML Protocol
  • HTTP Bindings
  • Speaking "Through" the Browser
  • Artifact and SOAP Bindings
  • SAML Attributes
  • SAML SSO
  • Federated Identity
  • Identity Providers and Service Providers
  • Metadata
  • OpenID
  • Universal Identity
  • Security Concerns in SSO Systems
OAuth
  • Use Case: Third-Party Authorization
  • OAuth
  • Initial Flow
  • Grant Types
  • Access Tokens
  • The Google OAuth API
  • Implementing Authorization and Resource Servers
  • Implementing Clients
  • Security Concerns with OAuth
Conclusion

Training Materials:

All attendees receive comprehensive courseware covering all topics in the course outline.

Software Requirements:

  • Core 2 Duo or faster processor with at least 8 GB RAM
  • Any operating system that supports JDK 7 or later
  • JDK 7 or later
  • Eclipse Luna for Java EE Developers or later version
  • Related lab files that Accelebrate would provide


Learn faster

Our live, instructor-led lectures are far more effective than pre-recorded classes

Satisfaction guarantee

If your team is not 100% satisfied with your training, we do what's necessary to make it right

Learn online from anywhere

Whether you are at home or in the office, we make learning interactive and engaging

Multiple Payment Options

We accept check, ACH/EFT, major credit cards, and most purchase orders



Recent Training Locations

Alabama

Birmingham

Huntsville

Montgomery

Alaska

Anchorage

Arizona

Phoenix

Tucson

Arkansas

Fayetteville

Little Rock

California

Los Angeles

Oakland

Orange County

Sacramento

San Diego

San Francisco

San Jose

Colorado

Boulder

Colorado Springs

Denver

Connecticut

Hartford

DC

Washington

Florida

Fort Lauderdale

Jacksonville

Miami

Orlando

Tampa

Georgia

Atlanta

Augusta

Savannah

Hawaii

Honolulu

Idaho

Boise

Illinois

Chicago

Indiana

Indianapolis

Iowa

Cedar Rapids

Des Moines

Kansas

Wichita

Kentucky

Lexington

Louisville

Louisiana

New Orleans

Maine

Portland

Maryland

Annapolis

Baltimore

Frederick

Hagerstown

Massachusetts

Boston

Cambridge

Springfield

Michigan

Ann Arbor

Detroit

Grand Rapids

Minnesota

Minneapolis

Saint Paul

Mississippi

Jackson

Missouri

Kansas City

St. Louis

Nebraska

Lincoln

Omaha

Nevada

Las Vegas

Reno

New Jersey

Princeton

New Mexico

Albuquerque

New York

Albany

Buffalo

New York City

White Plains

North Carolina

Charlotte

Durham

Raleigh

Ohio

Akron

Canton

Cincinnati

Cleveland

Columbus

Dayton

Oklahoma

Oklahoma City

Tulsa

Oregon

Portland

Pennsylvania

Philadelphia

Pittsburgh

Rhode Island

Providence

South Carolina

Charleston

Columbia

Greenville

Tennessee

Knoxville

Memphis

Nashville

Texas

Austin

Dallas

El Paso

Houston

San Antonio

Utah

Salt Lake City

Virginia

Alexandria

Arlington

Norfolk

Richmond

Washington

Seattle

Tacoma

West Virginia

Charleston

Wisconsin

Madison

Milwaukee

Alberta

Calgary

Edmonton

British Columbia

Vancouver

Manitoba

Winnipeg

Nova Scotia

Halifax

Ontario

Ottawa

Toronto

Quebec

Montreal

Puerto Rico

San Juan