Secure Java EE Development

JAV-404 (5 Days)

Request Pricing

Java EE 7 Security Training Overview

Accelebrate's Java EE 7 Security Training: Secure Java EE Development course shows experienced developers of Java EE applications and services how to write new code and upgrade existing code for maximum safety.

Location and Pricing

Most Accelebrate courses are taught as private, customized training for 3 or more attendees at our clients' sites worldwide. In addition, we offer live, private online classes for teams who may be in multiple locations or wish to save on travel costs. Please visit our client list for organizations for whom we have delivered onsite training. To receive a customized proposal and price quote for private on-site or online training, please contact us.

In addition, some courses are available as live, online classes for individuals. See a schedule of online courses.

Java EE 7 Security Training Objectives

All students will:

  • Develop secure Java web applications and services, or secure existing applications and services by refactoring as necessary.
  • Define security constraints and login configurations that instruct the web container to enforce authentication and authorization policies.
  • Guard against common web attacks including XSS, CSRF, and SQL injection.
  • Validate user input aggressively for general application health and specifically to foil injection and XSS attacks.
  • Configure a server and/or application to use one-way or two-way HTTPS.
  • Apply application-level cryptography where necessary.
  • Secure log files and establish audit trails for especially sensitive information or actions.
  • Use HMAC security as appropriate in RESTful web services.
  • Participate in SAML SSO systems and be aware of the security concerns involved in single sign-on.
  • Implement the server and client sides of the OAuth-2.0 initial flow in order to provide third-party authorization to resources in a secure manner.

Java EE 7 Security Training Outline

Expand All | Collapse All | Printer-Friendly

Introduction
Secure Web Applications
  • Threats and Attack Vectors
  • Server, Network, and Browser Vulnerabilities
  • Secure Design Principles
  • GET vs. POST
  • Container Authentication and Authorization
  • HTML Forms
  • Privacy Under /WEB-INF
  • HTTP and HTTPS
  • Other Cryptographic Practices
  • SOA and Web Services
  • The OWASP Top 10
Authentication and Authorization
  • HTTP BASIC and DIGEST Authentication Schemes
  • Declaring Security Constraints
  • User Accounts
  • Safeguarding Credentials in Transit
  • Replay Attacks
  • Authorization Over URL Patterns
  • Roles
  • FORM Authentication
  • Login Form Design
  • EJB Authorization
  • Programmatic Security
  • Programmatic Security in JSF
Common Web Attacks
  • Single Points of Decision
  • Cross-Site Scripting
  • Validation vs. Output Escaping
  • Forceful Browsing
  • Cross-Site Request Forgery
  • Request Tokens
  • Injection Attacks
  • Protections in JDBC and JPA
  • Session Management
  • Taking Care of Cookies
Input Validation
  • Validating User Input
  • Validation Practices
  • Regular Expressions
  • JSF Validation
  • Bean Validation (a/k/a JSR-303)
  • Constraint Annotations
  • Cross-Field Validation
  • Built-In Support in Java EE
  • Using a Validator
  • Producing Error Responses
HTTPS and Certificates
  • Digital Cryptography
  • Encryption
  • SSL and Secure Key Exchange
  • Hashing
  • Signature
  • Keystores
  • keytool
  • Why Keys Aren't Enough
  • X.509 Certificates
  • Certificate Authorities
  • Obtaining a Signed Certificate
  • Configuring HTTPS
  • Client-Side Certificates and Two-Way SSL
  • PKCS #12 and Trust Stores
  • CLIENT-CERT Authentication
Application-Level Cryptography
  • The Java Cryptography Architecture
  • Secure Random Number Generation
  • The KeyStore API
  • Digital Signature
  • Hashing
  • Password Hashing
  • Why Hashing Isn't Enough
  • Salts
  • Slow Algorithms
  • Key Lengthening and Key Strengthening
  • The Java Cryptography Extensions
  • The SecretKey and KeyGenerator Types
  • Symmetric Encryption
  • Choosing Algorithms and Key Sizes
  • Dangerous Practices
Secure Development Practices
  • Secure Development Cycle
  • Error Handling and Information Leakage
  • Failing to a Secure Mode
  • Logging Practices
  • Appropriate Content for Logs
  • Auditing
  • Strategies: Filters, Interceptors, and Command Chains
  • Penetration Testing
  • Back Doors
  • Secure Code Review
REST Security Basics
  • Security Concerns for REST Services
  • HTTPS
  • HTTP BASIC and DIGEST
  • Authorization by URL Pattern
  • Cross-Site Scripting
  • Injection Attacks
  • Cross-Site Request Forgery
  • Common Countermeasures
HMAC Security
  • Use Case: Message Authentication
  • Digital Signature
  • Hashing as Signature: the HMAC
  • Appropriate Salts
  • Canonicalization
  • Amazon S3
  • Timestamps
  • Signing and Verifying Messages
  • XML Cryptography and Canonicalization
  • Canonicalizing JSON
SAML SSO
  • Use Case: Single Sign-On
  • SAML Orientation
  • SAML Assertions
  • SAML Protocol
  • HTTP Bindings
  • Speaking "Through" the Browser
  • Artifact and SOAP Bindings
  • SAML Attributes
  • SAML SSO
  • Federated Identity
  • Identity Providers and Service Providers
  • Metadata
  • OpenID
  • Universal Identity
  • Security Concerns in SSO Systems
OAuth
  • Use Case: Third-Party Authorization
  • OAuth
  • Initial Flow
  • Grant Types
  • Access Tokens
  • The Google OAuth API
  • Implementing Authorization and Resource Servers
  • Implementing Clients
  • Security Concerns with OAuth
Conclusion
Request Pricing

Lecture percentage

40%

Lecture/Demo

Lab percentage

60%

Lab

Course Number:

JAV-404

Duration:

5 Days

Prerequisites:

  • Java programming experience is essential - Accelebrate's Beginning Java Application Development is excellent preparation should students need to get up to speed on Java.
  • Servlets programming experience is required - Students should have taken Accelebrate's Beginning JSP and Servlets or have equivalent experience.
  • JSP page-authoring experience is recommended but not required. Again, consider Beginning JSP and Servlets.
  • Understanding of RESTful web services as implemented in JAX-RS will be highly beneficial, but is not strictly required. Consider Accelebrate's RESTful Web Services with JAX-RS course for your team.

Training Materials:

All attendees receive comprehensive courseware covering all topics in the course outline.

Software Requirements:

  • Core 2 Duo or faster processor with at least 8 GB RAM
  • Any operating system that supports JDK 7 or later
  • JDK 7 or later
  • Eclipse Luna for Java EE Developers or later version
  • Related lab files that Accelebrate would provide

Contact Us:

Accelebrate’s training classes are available for private groups of 3 or more people at your site or online anywhere worldwide.

Don't settle for a "one size fits all" public class! Have Accelebrate deliver exactly the training you want, privately at your site or online, for less than the cost of a public class.

For pricing and to learn more, please contact us.

Contact Us Train For Us

Toll-free in US/Canada:
877 849 1850
International:
+1 678 648 3113

Toll-free in US/Canada:
866 566 1228
International:
+1 404 420 2491

925B Peachtree Street, NE
PMB 378
Atlanta, GA 30309-3918
USA

Subscribe to our Newsletter:

Never miss the latest news and information from Accelebrate:

Microsoft Gold Partner

Please see our complete list of
Microsoft Official Courses

Recent Training Locations

Alabama

Huntsville

Montgomery

Birmingham

Alaska

Anchorage

Arizona

Phoenix

Tucson

Arkansas

Fayetteville

Little Rock

California

San Francisco

Oakland

San Jose

Orange County

Los Angeles

Sacramento

San Diego

Colorado

Denver

Boulder

Colorado Springs

Connecticut

Hartford

DC

Washington

Florida

Fort Lauderdale

Miami

Jacksonville

Orlando

Saint Petersburg

Tampa

Georgia

Atlanta

Augusta

Savannah

Idaho

Boise

Illinois

Chicago

Indiana

Indianapolis

Iowa

Ceder Rapids

Des Moines

Kansas

Wichita

Kentucky

Lexington

Louisville

Louisiana

Baton Rouge

New Orleans

Maine

Portland

Maryland

Annapolis

Baltimore

Hagerstown

Frederick

Massachusetts

Springfield

Boston

Cambridge

Michigan

Ann Arbor

Detroit

Grand Rapids

Minnesota

Saint Paul

Minneapolis

Mississippi

Jackson

Missouri

Kansas City

St. Louis

Nebraska

Lincoln

Omaha

Nevada

Reno

Las Vegas

New Jersey

Princeton

New Mexico

Albuquerque

New York

Buffalo

Albany

White Plains

New York City

North Carolina

Charlotte

Durham

Raleigh

Ohio

Canton

Akron

Cincinnati

Cleveland

Columbus

Dayton

Oklahoma

Tulsa

Oklahoma City

Oregon

Portland

Pennsylvania

Pittsburgh

Philadelphia

Rhode Island

Providence

South Carolina

Columbia

Charleston

Spartanburg

Greenville

Tennessee

Memphis

Nashville

Knoxville

Texas

Dallas

El Paso

Houston

San Antonio

Austin

Utah

Salt Lake City

Virginia

Richmond

Alexandria

Arlington

Washington

Tacoma

Seattle

West Virginia

Charleston

Wisconsin

Madison

Milwaukee

Alberta

Edmonton

Calgary

British Columbia

Vancouver

Nova Scotia

Halifax

Ontario

Ottawa

Toronto

Quebec

Montreal

Puerto Rico

San Juan

© 2013-2019 Accelebrate, Inc. All Rights Reserved. All trademarks are owned by their respective owners.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.