Start your secure coding journey. This course provides a high-level look at common attacks against Java applications, as well as how to prevent and defend against those threats.
Overview
Syllabus
Introduction
- Keeping secure in Java
- What you should know
- Injection attacks
- Prevent SQL injection
- Other injection attacks
- Challenge: Refactor Java code susceptible to injection attacks
- Solution: Refactor Java code susceptible to injection attacks
- Sensitive data leak
- Log message leaks
- Exception leaks
- Challenge: Prevent sensitive data leaks
- Solution: Prevent sensitive data leaks
- Class and package accessibility
- Mutability
- Extensibility
- Build vulnerabilities
- Input validation
- Serialization
Taught by
Frank P Moley III