COD 313: Creating Secure Java Code
This course examines Java-specific security topics, including the Java security model, the Java authentication and authorization service (JAAS), and cryptography and key management. After completing this course, you will be able to identify and use the components of the Java security model. You will also be able to identify how to use JAAS to control user authentication and authorization in your Java application. In addition, you will be able to manage cryptographic key pairs and certificates in Java, and implement cryptography to sign and verify Java jar files.
Upon completion of this course, participants will be able to:
- List the time-tested defensive coding principles
- Use the coding principles to prevent common security vulnerabilities
- Handle sensitive data with care
- Compartmentalize users, processes, and data
- Follow the account management policy in place
- Follow the audit and logging procedure in place
- Implement the principle of least privilege
- Keep an open and simple design
- Limit the number of entry points to your application
- Do not reinvent the wheel
- Do not reveal too much information
This course can be customized for Instructor-Led training. Course contents and duration may vary. Contact us for details.