Java Training Overview|
This advanced course shows experienced developers of Java web applications how to secure those applications and to apply best practices with regard to secure enterprise coding. Authentication, authorization, and input validation are major themes, and students get good exposure to basic Java cryptography for specific development scenarios, as well as thorough discussions of HTTPS configuration and certificate management, error handling, logging, and auditing.
Java Training Prerequisites
Java Training Learning Objectives
- Java programming experience is essential -- Course "Java Programming" is excellent preparation.
- Servlets programming experience is required -- Course "Java Servlets"
- JSP page-authoring experience is recommended but not required
After completing this course, the student should be able to:
Java Training Course duration
- Generally, be prepared to develop secure Java web applications, or to secure existing applications by refactoring as necessary.
- Define security constraints and login configurations that instruct the web container to enforce authentication and authorization policies.
- Validate user input aggressively, for general application health and specifically to foil injection and XSS attacks.
- Configure a server and/or application to use one-way or two-way HTTPS.
- Apply application-level cryptography where necessary.
- Secure log files and establish audit trails for especially sensitive information or actions.
Java Training Course outline
Chapter 1. Secure Web Applications
Chapter 2. Authentication and Authorization
- Threats and Attack Vectors
- Server, Network, and Browser Vulnerabilities
- Secure Design Principles
- GET vs. POST
- Container Authentication and Authorization
- HTML Forms
- Privacy Under /WEB-INF
- HTTP and HTTPS
- Other Cryptographic Practices
- SOA and Web Services
- The OWASP Top 10
Chapter 3. Secure Application Design
- HTTP BASIC and DIGEST Authentication Schemes
- Declaring Security Constraints
- User Accounts
- Safeguarding Credentials in Transit
- Replay Attacks
- Authorization Over URL Patterns
- FORM Authentication
- Login Form Design
- EJB Authorization
- Programmatic Security
- Programmatic Security in JSF
Chapter 4. HTTPS and Certificates
- Single Points of Decision
- Cross-Site Scripting
- Validation vs. Output Escaping
- Forceful Browsing
- Cross-Site Request Forgery
- Request Tokens
- Injection Attacks
- Protections in JDBC and JPA
- Session Management
- Taking Care of Cookies
- Validating User Input
- Validation Practices
- Regular Expressions
- JSF Validation
Chapter 5. Application-Level Cryptography
- Digital Cryptography
- SSL and Secure Key Exchange
- Why Keys Aren't Enough
- X.509 Certificates
- Certificate Authorities
- Obtaining a Signed Certificate
- Configuring HTTPS
- Client-Side Certificates and Two-Way SSL
- PKCS #12 and Trust Stores
- CLIENT-CERT Authentication
Chapter 6. Secure Development Practices
- The Java Cryptography Architecture
- Secure Random Number Generation
- The KeyStore API
- The Signature Class
- The SignedObject Class
- The MessageDigest Class
- The Java Cryptography Extensions
- The SecretKey and KeyGenerator Types
- The Cipher Class
- Choosing Algorithms and Key Sizes
- Dangerous Practices
Appendix A. Learning Resources
- Secure Development Cycle
- Error Handling and Information Leakage
- Failing to a Secure Mode
- Logging Practices
- Appropriate Content for Logs
- Strategies: Filters, Interceptors, and Command Chains
- Penetration Testing
- Back Doors
Minimum Hardware Requirements
Minimum Software Requirements
- 1 GHz, 256 meg RAM, 500 meg disk space.
Hardware – recommended
- All free downloadable tools.
Network and Security
- 1.5 GHz, 512 meg RAM, 1 gig disk space.
- Limited privileges required
- Tested on Windows XP Professional. Course software should be viable on all systems which support a J2SE 5.0 JDK.