Skip to content

FÜR EINZELPERSONEN

open
Logo

FÜR EINZELPERSONEN

open
Logo
FACHBEREICH
open
Logo
UNTERFACHBEREICH
open
Logo
UNTERFACHBEREICH
open
Logo
SEMINARE
open
Basic
Advanced
Expert
Sonstige Seminare

SEMINAR

S-1900
Cloud
Background
5 Tage
Background
Standorte
Background
Termine

Cloud application security in Java for AWS

Kein Badge verfügbar.

Ihren Wunschtermin finden
Background
Praxisnahe Seminare, die Ihren Berufsalltag spürbar erleichtern
Background
SEMINARINHALTE

Das erwartet Sie

Ziele
open
Understand cloud security specialties Getting familiar with essential cyber security concepts Understanding how cryptography supports security Learning how to use cryptographic APIs correctly in Java Understanding Web application security issues Detailed analysis of the OWASP Top Ten elements Putting Web application security in the context of Java Going beyond the low hanging fruits Managing vulnerabilities in third party components Learn to deal with cloud infrastructure security Input validation approaches and principles Identify vulnerabilities and their consequences Learn the security best practices in Java
Inhalt
open

Day 1

  • Cyber security basics
  •        What is security?
  •        Threat and risk
  •        Cyber security threat types – the CIA triad
  •        Cyber security threat types – the STRIDE model
  •        Consequences of insecure software
  • Cloud security basics
  •        Cloud infrastructure basics
  •        The Cloud Cube Model and Zero Trust Architecture
  • The OWASP Top Ten 2021
  •        The OWASP Top 10 2021
  •        A01 - Broken Access Control
  •                Access control basics
  •                Failure to restrict URL access
  •                Confused deputy
  •                File upload
  •                Open redirects and forwards
  •                Cross-site Request Forgery (CSRF)
  •        A02 - Cryptographic Failures
  •                Information exposure
  •                Cryptography for developers


Day 2

  • A02 - Cryptographic Failures (continued)
  •        Cryptography for developers
  •        Transport security
  • A03 - Injection
  •        Injection principles
  •        Injection attacks
  •        SQL injection
  •        NoSQL injection
  •        Parameter manipulation
  •        Code injection
  •        HTML injection - Cross-site scripting (XSS)


Day 3

  • A04 - Insecure Design
  •        The STRIDE model of threats
  •        Secure design principles of Saltzer and Schroeder
  •        Client-side security
  • A05 - Security Misconfiguration
  •        Configuration principles
  •        Server misconfiguration
  •        AWS configuration best practices
  •        Cookie security
  •        XML entities
  • A06 - Vulnerable and Outdated Components
  •        Using vulnerable components
  •        Assessing the environment
  •        Hardening
  •        Untrusted functionality import
  •        Vulnerability management
  • A07 - Identification and Authentication Failures
  •        Authentication
  •        Session management
  •        Identity and access management (IAM)


Day 4

  • A07 - Identification and Authentication Failures (continued)
  •        Password management
  • A08 - Software and Data Integrity Failures
  •        Integrity protection
  •        Subresource integrity
  •        Insecure deserialization
  • A09 - Security Logging and Monitoring Failures
  •        Logging and monitoring principles
  •        Log forging
  •        Log forging – best practices
  •        Case study – Log interpolation in log4j
  •        Case study – The Log4Shell vulnerability (CVE-2021-44228)
  •        Case study – Log4Shell follow-ups (CVE-2021-45046, CVE-2021-45105)
  •        Lab – Log4Shell
  •        Logging best practices
  •        Detection and monitoring
  • A10 - Server-side Request Forgery (SSRF)
  •        Server-side Request Forgery (SSRF)
  •        Case study – SSRF and the Capital One breach


Cloud security

  • AWS security
  •        Security considerations
  •        Data security in the cloud


Day 5

  • Cloud security
  •        Container security
  •                Container security concerns
  •                Containerization, virtualization and security
  •                The attack surface
  •                Docker security
  •                Kubernetes security


The OWASP Top Ten 2021


Web application security beyond the Top Ten


  • Code quality
  • Denial of service


Input validation

  • Input validation principles
  • Denylists and allowlists
  • What to validate – the attack surface
  • Where to validate – defense in depth
  • When to validate – validation vs transformations
  • Validation with regex
  • Integer handling problems
  •        Representing signed numbers
  •        Integer visualization
  •        Integer overflow
  •        Lab – Integer overflow
  •        Signed / unsigned confusion in Java
  •        Case study – The Stockholm Stock Exchange
  •        Integer truncation
  •        Best practices
  • Files and streams
  •        Path traversal
  •        Lab – Path traversal
  •        Path traversal-related examples
  •        Additional challenges in Windows
  •        Virtual resources
  •        Path traversal best practices
  •        Lab – Path canonicalization
  • Unsafe reflection
  •        Reflection without validation
  •        Lab – Unsafe reflection
  • Unsafe native code
  •        Native code dependence
  •        Lab – Unsafe native code
  •        Best practices for dealing with native code


Wrap up

  • Secure coding principles
  • And now what?
Badge
open

Kein Badge verfügbar.

Vorkenntnisse
open
General Java and Web development
Zielgruppe
open
Java developers working on Web applications and AWS
Methoden
open
Mann mit Laptop
Seien Sie nicht nur am Ergebnis orientiert. Sondern auch am Erlebnis.
Manager Institut Swoosh
Unsere Bestsellerseminare
Manager University Logo
Werdet die agilen Managerinnen und Manager von morgen.
Ziel: Zertifizierter Abschluss, um sich klar am Markt vor den anderen positionieren zu können; nutzen Sie Ihre Aufstiegschance für Weiterführung Ihrer Karriere. Persönliche und fachspezifische Persönlichkeitsentwicklung.

ZUR MANAGER INSTITUT UNIVERSITY

open
Kontakt
TELEFON
+49 800 3060303
FAX
+49 800 3060303 33
MAIL
beratung@manager-institut.de

MARTIN HEUBECK

Sales Gruppenseminare und Inhouse Standard
Mo - Fr 8:00 - 17:00 Uhr
Martin.Heubeck@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

ITALIA BRILLANTE

Group Leader Inhouse und Seminarmanagement
Mo - Fr 8:00 - 17:00 Uhr
Italia.Brillante@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

TUGBA PAMUKCUOGLU

Seminarmanager
Mo - Fr 8:00 - 17:00 Uhr
Tugba.Pamukcuoglu@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

JESSICA GERSTENLAUER

Junior Seminarmanager
Mo - Fr 8:00 - 17:00 Uhr
Jessica.Gerstenlauer@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

FAYZULLAKHON UMAROV

Seminar and Finance Coordinator
Mo - Fr 8:00 - 17:00 Uhr
Fayzullakhon.Umarov@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

SIMONE HABERGER-ZAHN

Finance Manager
Mo - Fr 8:00 - 17:00 Uhr
Buchhaltung@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

ANNA HENNING

Marketing Manager
Mo - Fr 8:00 - 17:00 Uhr
Anna.Henning@
www.manager-institut.de

BERATUNGSTERMIN BUCHEN

open
MEINUNGEN