Secure coding in Java with Web Application Examples
- Description
- Curriculum
- FAQ
- Reviews
From this course, you can learn Secure Coding in Java.
There are a lot of other courses on this topic. So, why would you choose exactly this course? Here are just a few reasons:
– Coding examples
To learn to program is not enough just watching videos and reading books. You also need to have a lot of practice. In this training course, you will review multiple practical tasks and coding examples which will help you learn and understand Java better.
– Open source code
We hide nothing from our students! Including the source code for the home task solutions and source code of examples that were shared during the lesson. Having the source code you can just copy and paste it to run it on your local computer to understand how things work better.
You are allowed to use all source code examples for learning purposes. This helps significantly to configure the environment and make tests work, especially in case students didn’t work with any testing framework in the past.
– Q&A support
The significant difference between the online and offline learning process is the instructor’s availability. If you are in one room with a tutor he always can help you to get understand the specific concept or to help fix your code on your computer.
In this course, we are supporting students with answers to any questions flagged in the Q&A section. In case there will be recurring questions – separate video lessons will be created to show how to address the issue.
So with this course you are not just getting video materials, code exercises, source code, access to the free mobile application without limits (which is still pretty cool, huh? 🙂 ), but you also get tutor support and answers to your questions along with this course.
– Relevant knowledge
After our team investigated other Java courses on Udemy we realized that most of them have nothing in common with real life. The information which is shared there is very old and significantly out of date. For example, the instructor teaches a framework which is not been used already for 15 years. Or instructors do stress on the programming design which is not used anymore at all!
The instructor of this course is a consultant in a top-rated IT outsourcing company and helps to bring cutting-edge solutions in IT for all his clients. Feel free to check the LinkedIn page of the instructor and check skills endorsement. More than 19 thousand people across all over the world (BTW most of them are from the top 100 companies of the world) evaluated the skills of Andrii Piatakha.
With this course, you can be sure that you will spend your time learning the right things from one of the best IT consultants in the world.
– Free mobile App without limits for our students
Knowing Java is one skill. Be able to pass interviews in the company – that is another skill 🙂 Nowadays a lot of companies use tests to select candidates on the first level of interview. We developed applications to practice skills specifically for such purposes.
In this course, we will provide you link to download our FREE mobile app for android. (soon it will be also available for iOS platforms)
The instructor of this course comes up with hundreds of tests that are used to test the knowledge of candidates. With this application, you will be well-prepared for the interview.
Also, only for our students – there is no limit on attempts to pass certification. In the course, we will tell you how to set up a special bonus code that will remove restrictions for our students inside the app.
– High concentration of useful material in each lesson
Sometimes you can notice that watching 5 minutes of our lesson is equivalent to watching another 30 minutes lesson.
This is because time spent for preparation for the lesson (script for the lesson, lesson structure) and video editing (to cut boring pieces of the lesson or time when the program loads) sometimes 10 times as much (sometimes even 20) as the final lesson duration after video editing.
Also, each topic is separated from another. In case some concept will be explained in the next lesson and you don’t need to worry about understanding this in the scope of this lesson – the instructor will make an announcement when a specific topic will be covered.
Go and try it yourself! We will appreciate your feedback.
So don’t wait! Take a look at the lessons’ preview if you still have doubts!
Buy this course today, and you will get all updates for FREE!
For those who successfully passed this training course, or for students who were recognized for asking amazing questions, there is a special offer from the IT-Bulls company! The creator of this course is IT-Bulls company CEO and Founder. We are always in search of talents to run our amazing startups together with you. Probably you always dreamed about running your startup? In this course, you will be able to find the team who will teach you how to do that and (in particular cases) will be glad to help with implementation!
Hope you enjoy this course! And remember, we appreciate all your feedback! Your feedback will help us to become even better! Your feedback will help us to create to best Java course ever!
See you at the lessons! 🙂
-
1Communication planVideo lesson
From this lecture you will learn:
• How to communicate during this course• Where to ask questions
• How to ask questions
• Communication channels
-
2Unlimited access to 'Learn IT' application for studentsVideo lesson
From this lecture you will learn:
• Where to find good tests to verify your knowledge
• How to get unlimited access to Learn IT application (only for my students from Udemy)
-
3Tips to Improve Your Course Taking ExperienceText lesson
-
6Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures)Video lesson
Cryptographic Failures: Overview
The most common root causes
Comparative analysis between OWASP Top 10 2017 & 2021
Notable Common Weakness Enumerations
Types of cryptographic failures
Personal data VS Sensitive data
Types of sensitive data
Cryptographic Failure vs. Data Breach
What leads to cryptographic failures
-
7Cryptography Failures (Practical Examples, SQL Injections, TLS/SSL, HTTPS)Video lesson
Example of attack scenraios
SQL Injections
TLS & SSL
HTTPS VS HTTP
Enabling HTTPS on Tomcat web server
-
8Cryptography Failures (Examples, Password Encryption, Hashing, Salting)Video lesson
Example of attack scenraios
Password encryption practical exercise
Passwords hashing
Salted passwords
Hashing algorithms (MD5, SHA, PBKDF2, BCrypt, and SCrypt)
How to prevent cryptographic failures
-
9Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection)Video lesson
Injection Risk Category: Overview
Fuzzing
Notable Common Weakness Enumerations (CWEs)
Impact
Comparison of Injection in OWASP Top 10 2021 and 2017
Injection Types
Command Injection
-
10Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections)Video lesson
Cross Site Scripting
Types of Cross Site Scripting
SQL Injection
JPA Injection
NoSQL Injection
-
11Injection (XPath Injection, Log Injection, Input Validation)Video lesson
XML: XPath Injection
Log Injection
How to prevent injection vulnerabilities
Input Validation: Goals
Input Validation: Strategies
Input Validation: Techniques
-
12Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto)Video lesson
Insecure Design Overview
Insecure Design VS Insecure Implementation
Shift left security approach
Notable CWEs
What is secure design
Threat Modeling
Goal of threat modeling
Threat Modeling Manifesto: Overview
Threat Modeling Manifesto: Values
Threat Modeling Manifesto: Principles
-
13Insecure Design (Secure Design Process, Security Controls, Metrics, Examples)Video lesson
Build a secure design process
Business impact analysis
Working with threat register
Security controls
Security design document
Secure Design Process Metrics
Example of Attacks
How to prevent
-
14Security Misconfiguration (Overview, CWEs, Types, Real-life attacks)Video lesson
Overview
Potential Impact
Notable CWEs
Security Misconfiguration in OWASP Top 10 2021 VS 2017
Types of security misconfiguration
Examples of real-life attacks
Federated Architecture
-
15Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice)Video lesson
Security Hardening
Zero Trust Security Model
NIST 800-207
Defense in Depth
NIST 800-123
Best Practices for System Hardening
Example of Attacks - Demo
How to prevent
-
19Security Logging & Monitoring FailuresVideo lesson
What is logging and logs
Overview of Security Logging and Monitoring Failures Category
Potential Impact
Risk Factors
Challenges
Log Management Tools
Libraries for Logging in Java
Notable Common Weakness Enumerations
OWASP Top 10 2017 VS 2021
Attack Examples
How to Prevent
-
20Logging in Java: Part 1 (Logging theory, Logging Levels, Java Logging Framework)Video lesson
What is logging and logs
Goals of logging
Overview of libraries for logging in Java
Java Logging Framework (java.util.logging)
Key elements of Java Logging Framework
java.util.logging package overview
Logging Levels
Logging Levels in Java Logging Framework
Java Logging Framework practical examples
Using of Logger per class
-
21Logging in Java: Part 2 (Log4J, Logback, SLF4J)Video lesson
Log4J & Log4J2
Logging levels in Log4J
Structure elements of Log4J
Triggering policies in Log4J
Rollover strategies in Log4J
Log4J2 practical examples
Logback
Logback features
Logback practical examples
SLF4J
SLF4J + Log4J2
SLF4J + Logback
External Links May Contain Affiliate Links read more