Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
IT Security & Secure Coding Foundations
- Understanding the CIA triad: Confidentiality, Integrity, and Availability as core security principles
- Common vulnerabilities and attacks across languages/platforms (SQLi, XSS, CSRF, SSRF, etc.)
- The role of a secure SDLC in code-level threat prevention, detection, and mitigation strategies
Web Application Security in Java Context
- OWASP Top Ten: Aligning industry standards with common Java flaws
- Injection mitigation: Proper use of prepared statements, ORM layers, and parameterized queries
- Authentication vulnerabilities (such as broken session management and XSS-as-vector) and remediation patterns
- Input validation techniques for robustness against directory traversal and path manipulation attacks
Foundations of Java Security & Cryptography Deep Dive
- Core cryptography concepts: symmetric vs. asymmetric encryption, hashing algorithms, and digital signatures
- Secure communication protocols: Best practices for TLS/SSL setup in Java applications (HTTPS)
- Practical lab: Configuring secure connections between web servers and backend services using SSL/TLS
Java Security Services & Enterprise Security Features
- Utilizing the built-in security API to implement robust authentication (JAAS, KeyStore, CertificatePath, SecureRandom)
- Managing user sessions with minimal risk of hijacking or fixation
- Lab: Implementing secure session management patterns and mitigating risks associated with session cookie theft
Common Coding Errors & Vulnerabilities in Java
- Recognizing insecure coding patterns that lead to class loading vulnerabilities (CVEs related to deserialization and JAR extraction)
- Preventing unsafe reflection usage that could lead to arbitrary code execution under privilege elevation
- Understanding the impact of insecure logging frameworks and mitigating risk through secure handlers or logging levels
- Hands-on lab: Refactoring insecure Java code samples into secure patterns (FindSecurityBugs refactoring exercise)
Cryptography in Practice & Modern Secure Coding Patterns
- Practical encryption: Designing secure key management and protecting sensitive data in transit and at rest
- Hashing for integrity verification: Password storage, file content validation, and digital signing workflows
- Lab: Implementing secure data hashing (SHA-256) for password storage and validating stored hashes against input
Advanced Secure Coding & Threat Modeling
- Integrating static code analysis into CI/CD pipelines using FindSecurityBugs in Maven/Gradle
- Identifying risks early in the design phase through threat modeling workshops
- Workshop: Applying threat modeling to a sample Java application, prioritizing risks, and implementing secure coding practices
Capstone Project & Secure Coding Roadmap
- Participants select a real-world Java project (web application, microservice, or library)
- Analyzing the codebase for OWASP Top Ten vulnerabilities (injection, broken auth, SSI, etc.)
- Refactoring insecure code into best practice patterns and implementing secure service configurations
- Documenting the process, challenges encountered, and new learning outcomes with peer review and facilitator feedback
Open Q&A, Resources Distribution & Final Review
- Open discussion forum to address common secure coding questions, clarify advanced concepts, and share real-world experiences
- Curated resource library: OWASP Java Secure Coding Top Ten CheatSheet, FindSecurityBugs refactoring guide, and recommended secure coding libraries
- Course closure and post-training support for applying new skills in ongoing projects
Requirements
- Basic computer proficiency for operating a modern laptop/desktop OS and standard office productivity tools (word processors, spreadsheets)
- No prior Java programming or security experience is required; however, a foundation-level understanding of object-oriented concepts and standard web development workflows is encouraged
- Willingness to engage in hands-on exercises, quizzes, and real-world case study analysis to practice skill application
14 Hours
Custom Corporate Training
Training solutions designed exclusively for businesses.
- Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
- Flexible Schedule: Dates and times adapted to your team's agenda.
- Format: Online (live), In-company (at your offices), or Hybrid.
Price per private group, online live training, starting from 2600 € + VAT*
Contact us for an exact quote and to hear our latest promotions
Testimonials (3)
That we got a complex overview also about the context - for example why do we need some annotations and what they mean. I liked the practical part of the training - having to manually run the commands and call the rest api's
Alina - ACCENTURE SERVICES S.R.L
Course - Quarkus for Developers
interaction through exercises and also projects sharing
Claudiu - MSG system
Course - Advanced Spring Boot
The extra information that was shared, the training was not straightforward groovy, which was nice.