Skip to content

FÜR EINZELPERSONEN

open
Logo

FÜR EINZELPERSONEN

open
Logo
FACHBEREICH
open
Logo
UNTERFACHBEREICH
open
Logo
UNTERFACHBEREICH
open
Logo
SEMINARE
open
Basic
Advanced
Expert
Sonstige Seminare

SEMINAR

S-1540
JAVA
Background
5 Tage
Background
Standorte
Background
Termine

Web application security masterclass in Java

Kein Badge verfügbar.

Ihren Wunschtermin finden
Background
Praxisnahe Seminare, die Ihren Berufsalltag spürbar erleichtern
Background
SEMINARINHALTE

Das erwartet Sie

Ziele
open
Getting familiar with essential cyber security concepts Understanding how cryptography supports security Learning how to use cryptographic APIs correctly in Java Understanding Web application security issues Detailed analysis of the OWASP Top Ten elements Putting Web application security in the context of Java Going beyond the low hanging fruits Input validation approaches and principles Managing vulnerabilities in third party components Getting familiar with security testing techniques and tools
Inhalt
open

Day 1

  • Cyber security basics
  •        What is security?
  •        Threat and risk
  •        Cyber security threat types – the CIA triad
  •        Consequences of insecure software
  •        Constraints and the market
  • The OWASP Top Ten 2021
  •        The OWASP Top 10 2021
  •        A01 - Broken Access Control
  •                Access control basics
  •                Failure to restrict URL access
  •                Confused deputy
  •                File upload
  •                Open redirects and forwards
  •                Cross-site Request Forgery (CSRF)
  •        A02 - Cryptographic Failures
  •                Information exposure
  •                Cryptography for developers


Day 2

  • A02 - Cryptographic Failures (continued)
  •        Cryptography for developers
  •        Certificates
  • A03 - Injection
  •        Injection principles
  •        Injection attacks
  •        SQL injection
  •        Code injection
  •        HTML injection - Cross-site scripting (XSS)


Day 3

  • A03 - Injection (continued)
  •        Input validation
  • A04 - Insecure Design
  •        The STRIDE model of threats
  •        Secure design principles of Saltzer and Schroeder
  •        Client-side security


Day 4

  • A05 - Security Misconfiguration
  •        Configuration principles
  •        Server misconfiguration
  •        Cookie security
  •        XML entities
  • A06 - Vulnerable and Outdated Components
  •        Using vulnerable components
  •        Assessing the environment
  •        Hardening
  •        Untrusted functionality import
  •        Vulnerability management
  • A07 - Identification and Authentication Failures
  •        Authentication
  •        Session management
  •        Password management
  • A08 - Software and Data Integrity Failures
  •        Integrity protection


Day 5

  • A08 - Software and Data Integrity Failures (continued)
  •        Subresource integrity
  •        Insecure deserialization
  • A09 - Security Logging and Monitoring Failures
  •        Logging and monitoring principles
  •        Insufficient logging
  •        Case study – Plaintext passwords at Facebook
  •        Log forging
  •        Log forging – best practices
  •        Case study – Log interpolation in log4j
  •        Case study – The Log4Shell vulnerability (CVE-2021-44228)
  •        Case study – Log4Shell follow-ups (CVE-2021-45046, CVE-2021-45105)
  •        Lab – Log4Shell
  •        Logging best practices
  •        Monitoring best practices
  • A10 - Server-side Request Forgery (SSRF)
  •        Server-side Request Forgery (SSRF)
  •        Case study – SSRF and the Capital One breach
  • Web application security beyond the Top Ten
  •        Code quality
  •        Denial of service
  • Security testing
  •        Security testing techniques and tools
  •                Code analysis
  •                Dynamic analysis
  • Wrap up
  •        Secure coding principles
  •        And now what?
Badge
open

Kein Badge verfügbar.

Vorkenntnisse
open
General Java and Web development.
Zielgruppe
open
Java developers working on Web applications.
Methoden
open
Mann mit Laptop
Seien Sie nicht nur am Ergebnis orientiert. Sondern auch am Erlebnis.
Manager Institut Swoosh
Unsere Bestsellerseminare
Manager University Logo
Werdet die agilen Managerinnen und Manager von morgen.
Ziel: Zertifizierter Abschluss, um sich klar am Markt vor den anderen positionieren zu können; nutzen Sie Ihre Aufstiegschance für Weiterführung Ihrer Karriere. Persönliche und fachspezifische Persönlichkeitsentwicklung.

ZUR MANAGER INSTITUT UNIVERSITY

open
Kontakt
TELEFON
+49 800 3060303
FAX
+49 800 3060303 33
MAIL
beratung@manager-institut.de

MARTIN HEUBECK

Sales Gruppenseminare und Inhouse Standard
Mo - Fr 8:00 - 17:00 Uhr
Martin.Heubeck@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

ITALIA BRILLANTE

Group Leader Inhouse und Seminarmanagement
Mo - Fr 8:00 - 17:00 Uhr
Italia.Brillante@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

TUGBA PAMUKCUOGLU

Seminarmanager
Mo - Fr 8:00 - 17:00 Uhr
Tugba.Pamukcuoglu@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

JESSICA GERSTENLAUER

Junior Seminarmanager
Mo - Fr 8:00 - 17:00 Uhr
Jessica.Gerstenlauer@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

FAYZULLAKHON UMAROV

Seminar and Finance Coordinator
Mo - Fr 8:00 - 17:00 Uhr
Fayzullakhon.Umarov@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

SIMONE HABERGER-ZAHN

Finance Manager
Mo - Fr 8:00 - 17:00 Uhr
Buchhaltung@
manager-institut.de

BERATUNGSTERMIN BUCHEN

open

ANNA HENNING

Marketing Manager
Mo - Fr 8:00 - 17:00 Uhr
Anna.Henning@
www.manager-institut.de

BERATUNGSTERMIN BUCHEN

open
MEINUNGEN