Get in Touch

Course Outline

IT Security & Secure Coding Foundations

  • Understanding the CIA triad: Confidentiality, Integrity, and Availability as core security principles
  • Common vulnerabilities and attacks across languages/platforms (SQLi, XSS, CSRF, SSRF, etc.)
  • The role of a secure SDLC in code-level threat prevention, detection, and mitigation strategies

Web Application Security in Java Context

  • OWASP Top Ten: Aligning industry standards with common Java flaws
  • Injection mitigation: Proper use of prepared statements, ORM layers, and parameterized queries
  • Authentication vulnerabilities (such as broken session management and XSS-as-vector) and remediation patterns
  • Input validation techniques for robustness against directory traversal and path manipulation attacks

Foundations of Java Security & Cryptography Deep Dive

  • Core cryptography concepts: symmetric vs. asymmetric encryption, hashing algorithms, and digital signatures
  • Secure communication protocols: Best practices for TLS/SSL setup in Java applications (HTTPS)
  • Practical lab: Configuring secure connections between web servers and backend services using SSL/TLS

Java Security Services & Enterprise Security Features

  • Utilizing the built-in security API to implement robust authentication (JAAS, KeyStore, CertificatePath, SecureRandom)
  • Managing user sessions with minimal risk of hijacking or fixation
  • Lab: Implementing secure session management patterns and mitigating risks associated with session cookie theft

Common Coding Errors & Vulnerabilities in Java

  • Recognizing insecure coding patterns that lead to class loading vulnerabilities (CVEs related to deserialization and JAR extraction)
  • Preventing unsafe reflection usage that could lead to arbitrary code execution under privilege elevation
  • Understanding the impact of insecure logging frameworks and mitigating risk through secure handlers or logging levels
  • Hands-on lab: Refactoring insecure Java code samples into secure patterns (FindSecurityBugs refactoring exercise)

Cryptography in Practice & Modern Secure Coding Patterns

  • Practical encryption: Designing secure key management and protecting sensitive data in transit and at rest
  • Hashing for integrity verification: Password storage, file content validation, and digital signing workflows
  • Lab: Implementing secure data hashing (SHA-256) for password storage and validating stored hashes against input

Advanced Secure Coding & Threat Modeling

  • Integrating static code analysis into CI/CD pipelines using FindSecurityBugs in Maven/Gradle
  • Identifying risks early in the design phase through threat modeling workshops
  • Workshop: Applying threat modeling to a sample Java application, prioritizing risks, and implementing secure coding practices

Capstone Project & Secure Coding Roadmap

  • Participants select a real-world Java project (web application, microservice, or library)
  • Analyzing the codebase for OWASP Top Ten vulnerabilities (injection, broken auth, SSI, etc.)
  • Refactoring insecure code into best practice patterns and implementing secure service configurations
  • Documenting the process, challenges encountered, and new learning outcomes with peer review and facilitator feedback

Open Q&A, Resources Distribution & Final Review

  • Open discussion forum to address common secure coding questions, clarify advanced concepts, and share real-world experiences
  • Curated resource library: OWASP Java Secure Coding Top Ten CheatSheet, FindSecurityBugs refactoring guide, and recommended secure coding libraries
  • Course closure and post-training support for applying new skills in ongoing projects

Requirements

  • Basic computer proficiency for operating a modern laptop/desktop OS and standard office productivity tools (word processors, spreadsheets)
  • No prior Java programming or security experience is required; however, a foundation-level understanding of object-oriented concepts and standard web development workflows is encouraged
  • Willingness to engage in hands-on exercises, quizzes, and real-world case study analysis to practice skill application
 14 Hours

Custom Corporate Training

Training solutions designed exclusively for businesses.

  • Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
  • Flexible Schedule: Dates and times adapted to your team's agenda.
  • Format: Online (live), In-company (at your offices), or Hybrid.
Investment

Price per private group, online live training, starting from 2600 € + VAT*

Contact us for an exact quote and to hear our latest promotions

Testimonials (3)

Provisional Upcoming Courses (Contact Us For More Information)

Related Categories