Secure Coding Java
Equip Java developers with secure-coding practices and defensive techniques to mitigate common web and API vulnerabilities across Java SE/EE applications.
Get Course Info
Audience: Developers / Team leads / Project managers
Duration: 2 days
Format: Lectures and hands-on labs (50 % – 50 %)
Overview
Focused on Java, this course covers common attacks and defenses, secure Java SE/EE coding, REST endpoint security, code signing, tools, and modern frameworks such as Vault and Consul.
Objective
Equip Java developers with secure-coding practices and defensive techniques to mitigate common web and API vulnerabilities across Java SE/EE applications.
What You Will Learn
- Threat modeling (STRIDE, CVSS) and labs
- OWASP Goat-labs on XSS, CSRF, session hijacking, encryption
- Java SE security (mutability, scopes, thread safety, input validation)
- Java EE security (role-based auth, declarative/programmatic security)
- REST endpoint security with OAuth2
- Code signing on Windows, macOS, Linux
- Static analysis (SonarQube) & SEI CERT labs
- Modern frameworks: Vault, Consul, Anthos; dynamic secrets & zero-trust
Course Details
Audience: Developers / Team leads / Project managers
Duration: 2 days
Format: Lectures and hands-on labs (50 % – 50 %)
Cybersecurity awareness • Comfortable developing code in Java
Setup: Local IntelliJ highly recommended (backup cloud lab available) • Chrome browser
Detailed Outline
- STRIDE
- CVSS
- Lab
- XSS
- Session hijacking
- Malicious file execution
- Object mutability
- Scopes
- Thread safety
- Exception handling
- Role-based auth
- Security constraints
- Programmatic vs declarative
- OAuth2
- Best practices
- Overview & platforms
- Audits/logs
- Static analysis (SonarQube)
- Vault, Consul, Anthos
- Zero-trust, AI
Ready to Get Started?
Contact us to learn more about this course and schedule your training.