About the course:
This Secure Java Development course is designed for people involved in the production of Java software applications, and will give delegates useful tools and techniques to harden systems against attack.
It's all too often the case that security comes as an afterthought - if it comes at all, in the drive to keep pushing out new iterations and products. Without being given adequate time to explore security in depth, it's unlikely many development team members will have considered the extent to which businesses are exposed to external - and internal - malicious actors.
This secure Java development course will give you the techniques and hands-on experience with relevant security tools to help protect your business systems from attackers, and help instil a security-first mindset. We also encourage ways to implement security quickly, efficiently, at the right time, and most importantly, effectively too!
This training uses hands-on technical examples, security tools and teamwork to thoroughly analyse and understand the modern security environment.
We will give delegates access to deliberately vulnerable virtual environments which reflect real-world scenaros in order to learn how to fortify against malicious intrusion. We're happy for delegates to choose their preferred Java IDE and can discuss other ways to make the course as relevant as possible to your tech stack.
Our secure Java development course course also takes a good hard look at the Open Web Application Security Project (OWASP) Top Ten most critical web application security risks and how to guard against them.
By the end of the course, you will have learnt about:
- Analysing risk and the attack surface
- Client-side security Methods
- OWASP Top 10 – Hands On
- Fortifying web applications
- Secure Development Cycle
- Threat Modelling
- Encryption
- Penetration Testing
Who should attend
The secure Java development with OWASP training course is suitable for application developers, testers, Business Analysts, database administrators, architects and anyone else involved in the production of Java code and includes coverage of front- and back-end systems security techniques.
Prerequisites
Delegates should have experience of managing, writing or testing Java code and ideally some exposure to interrogating, developing, or administering database applications (e.g. MySQL, PostgreSQL, Oracle...)
Live, instructor-led online and on-site training
We appreciate that you need flexibility to fit in with new working situations - whether you're an individual, part of a distributed team, or simply have projects and deadlines to meet.
Our remote training can take place online in a virtual classroom, with content split into modules to accommodate your scheduling challenges and meet your learning goals. Get in touch today to find out how we can help design a cost-effective, flexible training solution.
As soon as it's safe, we'll return to also offering the on-site custom training courses and programmes upon which we've built our reputation.
- Analysing Risk – Understanding your Threats
- Current Threat Vectors used to attack Dev Teams
- Client-Side Security – Protecting your users
- Client-side Secure Design Principles
- Why are Web Applications Insecure?
- OWASP Top 10 – Hands On
- Authentication and Authorization – securing Java web applications
- Implementing Secure Development Cycle
- Threat Modelling – Designing Effective protection
- Encryption – Ultimate Data Defence
- Penetration Testing – Tips & Techniques
- Testing for Secure Software - Review