Get in Touch

Course Outline

  • Understand web threats and attack vectors
  • Know secure design principles
  • Understand the OWASP Top 10 attacks
  • Understand authentication and authorisation issues
  • Know how to prevent cross-site scripting
  • Know how to prevent cross-site request forgery
  • Understand the secure development lifecycle
  • Know how to prevent injection attacks
  • Understand the protections in JDBC and JPA
  • Understand penetration testing methodologies
  • Know how to secure Java applications

Requirements

  • Experience with Java.
  • Experience in creating web applications.
 21 Hours

Number of participants


Price per participant

Testimonials (3)

Provisional Upcoming Courses (Require 5+ participants)

Related Categories