Secure Coding in Java

Secure Coding in Java

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 0h 59m | 120 MB

The enduring popularity of Java makes it a target for bad actors. And its prevalence in internal enterprise applications—which are vulnerable to attacks from employees with insider knowledge—renders secure coding practices even more critical. In this course, instructor Frank Moley helps advanced Java developers kick-start their secure coding journey, providing a high-level look at common attacks against Java applications, as well as how to prevent and defend against those threats. Frank discusses how to prevent SQL injection attacks, identify places where sensitive data is stored and avoid exposing it to the outside world, write code that protects the integrity of the system, and more. Along the way, he provides challenges that allow you to put your new skills to the test.

Table of Contents

1 Keeping secure in Java
2 What you should know
3 Injection attacks
4 Prevent SQL injection
5 Other injection attacks
6 Challenge Refactor Java code susceptible to injection attacks
7 Solution Refactor Java code susceptible to injection attacks
8 Sensitive data leak
9 Log message leaks
10 Exception leaks
11 Challenge Prevent sensitive data leaks
12 Solution Prevent sensitive data leaks
13 Class and package accessibility
14 Mutability
15 Extensibility
16 Build vulnerabilities
17 Input validation
18 Serialization