Writing Secure Code in Java Learning Path

Learn the ins and outs of writing secure coding in Java.

8 hours, 10 minutes

Quick facts

About this learning path

  • courses

    100% online

  • Duration

    8 hours, 10 minutes

  • Assessment

    questions

About Writing Secure Code in Java

This path will take you on a journey through the exciting challenges and opportunities of writing secure coding in Java. As you explore this path, you'll take a closer look at authentication, website security, malware, sensitive data and more, and how they relate to and affect your work in Java.

 

Syllabus

Secure Coding - Java

Lab - 00:30:00

Java is a high-level, general-purpose programming language that, once compiled, can run on any Java Virtual Machine (JVM), regardless of the underlying infrastructure. Except for the Write Once, Run Anywhere (WORA) advantage, Java also provides automatic memory management, thread management, automatic garbage collection, and a powerful cross-platform library. These benefits combined have made Java one of the most preferred programming languages, especially for client-server web applications.
Secure Coding in Java Skill Assessment

Assessment - 54 questions

Introduction to Java

Course - 00:54:00

Take a deep dive into input validation, how to validate various input types and how to safeguard against malicious inputs that would be used for injection attacks. RegEx is a powerful tool for validating inputs, but it can be susceptible to denial of service attacks. We'll go over how to structure your RegEx expressions to mitigate the risk of denial-of-service attacks.
Injection Attacks

Course - 00:32:00

This course provides a demonstration of several SQL injection attacks and the special characters required to make them possible. It includes an overview of other attacks such as XML, XPath and LDAP. In this course, you'll also practice encoding techniques and discuss how they are used to neutralize server-side injection attacks.
Authentication

Course - 00:29:00

In this course, you'll review all the components required to secure a system, including entering the passwords, changing passwords, resetting passwords, recovering lost credentials, velocity checking, account lockout and storing passwords and security questions and answers securely.
Sensitive Data

Course - 00:27:00

This course discusses sensitive data, non-sensitive data and personally identifiable information and provides examples of each. You'll review the General Data Protection Regulation and discuss the impact on developers needing to comply with the regulation.
Input Output

Course - 00:49:00

This course discusses and demonstrates how to securely upload a file to a Java-based application. You'll explore Transport Layer Security and how it evolved from Secure Sockets Layer, and how to troubleshoot your application.
Website Security

Course - 01:34:00

This course is a deep dive into redirects and forwards and the vulnerabilities associated with each. It discusses cross-site request forgeries, session management and how to construct filters to protect your website. You'll compare whitelists and blacklists and see how to use each to control access to the website.
Malware

Course - 00:21:00

In this course, you'll review available repositories and commercial software options for mitigating the risks of introducing viruses and malware into your enterprise. The course discusses formalized code reviews as a process for improving the quality of your software and mitigating the risk of introducing defects and bugs into your system.

Meet the author

Larry Ricker

Larry Ricker's professional experience includes development, system integration, business analysis, testing, design, technical lead, database administration, system administration, consulting, and production and project management.

He's primarily engaged in team projects for corporations and consulting work in mobile, telephony development, web development, two-factor authentication, security, SOAP and restful web services, voice recognition systems, identity verification, mobile activation and card fulfillment systems.

The details

Learning path insights

How to claim CPEs

Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your CPEs or CPUs.

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All-Source Analyst
  • Mission Assessment Specialist
  • Exploitation Analyst

No software. No set up. Unlimited access.

Skip the server racks and spin up a realistic environment with one click. Infosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every Infosec Skills subscription so your team can skill up however they learn best.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo