This course provides the necessary skills and techniques to identify security risks in Java web applications and mitigate those risks through writing secure code. The course aligns to the OWASP Top 10 most critical web application security risks and takes students through the exploitation of vulnerable code so that they may experience them first hand. It then discusses mitigations in depths and provides students with the opportunity to secure the risks they have just exploited.
The course is presented as a mixture of lectures and hands-on exercises. Students are actively involved in exercising the practices an attacker would employ so that they can fully experience the risks and outcomes of a successful attack first hand. They will also leverage various manual and automated tools to help probe for vulnerabilities in a consistent fashion with what many attackers would use.
- Delegates should already have experience of using the Java programming language, which can be gained by attending our Java programming language course.
- Delegates should be proficient with developing Java web applications. They should have prior experience of delivering real world web sites although it is not expected that their experience be extensive.
- Delegates should also already have experience of data access and data binding using APIs such as JDBC, JPA, and/or Hibernate.
Delegates will learn how to
- Define and understand common website security risks
- Remotely identify vulnerabilities in web applications
- Employ practices to secure discrete units of code
- Learn about native web browsers security defences
- Apply the principles of security in depth
- Automate scanning and detection of risks
Module 1: Introduction to Web Security
- Who's being hacked and who's doing the hacking?
- The prevalence of website vulnerabilities
- Key web application security concepts
Module 2: OWASP #1: Injection
- Exploiting SQL injection in a vulnerable website
- Whitelist validation
- Creating parameterised queries
- ORMs and stored procedures
- Database permissions and the principle of lease privilege
Module 3: OWASP #2: Cross Site Scripting - XSS
- Exploiting XSS in a vulnerable website
- Implementing validation in Java by using filters and wrappers
- Output encoding for different contexts
- Native browser defences
- Reflective, persistent and DOM XSS
Module 4: OWASP #3: Broken Authentication and Session Management
- Exploiting broken authentication in a vulnerable website
- Cookieless sessions
- Increasing session security
- Account management and password resets
Module 5: OWASP #4: Insecure Direct Object References
- Exploiting direct object references in a vulnerable website
- Implementing access controls
- Indirect reference maps
- Obfuscated identifiers
Module 6: OWASP #5: Cross-Site Request Forgery - CSRF
- Exploiting CSRF in a vulnerable website
- Leveraging the synchroniser token pattern
- Using the OWASP CSRF Guard module for Java
- Native browser defences against CSRF
Module 7: OWASP #6: Security Misconfiguration
- Exploiting security misconfiguration in a vulnerable website
- Using Maven to keep dependencies up to date
- Correctly configuring custom errors, tracing and debugging
- Encrypting configuration data
Module 8: OWASP #7: Insecure Cryptographic Storage
- Exploiting cryptographic storage in a vulnerable website
- Creating secure salted hashes
- Secure password storage options in Java
- Implementing symmetric encryption
Module 9: OWASP #8: Failure to Restrict URL Access
- Exploiting unrestricted URLs in a vulnerable website
- Using authorisation and security trimming
- Leveraging the role provider
- Employing principle permissions on classes and methods
Module 10: OWASP # 9: Insufficient Transport Layer Protection
- Exploiting insufficient transport layer security in a vulnerable website
- Properly implementing SSL on forms authentication
- Secure cookies and HSTS
- The dangers of mixed content
Module 11: OWASP #10: Unvalidated Redirects and Forwards
- Exploiting unvalidated redirects in a vulnerable website
- Whitelisting URLs
- Referrer checking
Module 12: Other risks and tools
- Clickjacking and other risks beyond the Top 10
- Employing automated tools to detect vulnerabilities
Module 13: Summary
- Going beyond technical controls to ensure application security
- Implementing people processes in the secure development lifecycle
21 November 2013
One of the things we're regularly asked on courses is "is there a quicker way to do xyz?"
Very often the answer is a resounding 'yes'.
So, I thought with this post I'd cover my favourite (and most commonly used) top 20 shortcuts when working with Adobe Photoshop (either in Creative Suite or Creative Cloud).
Beware of Geeks bringing gifts. The Site Members have more power in SharePoint 2013 than you may want them to.
01 January 0001
Apple's Big New Bite - It’s been just over a week since the new Apple releases and already more than 10 million iPhone 5s’ have been purchased and there have been more than 200 million iOS 7 downloads. But what new features do the iPhone 5s and iOS 7 offer its users?
Do you know how to be irreplaceable? Is there such a thing? In truth, no one is indispensable. People come and people go. But that does not mean you cannot strive to be irreplaceable.
01 January 0001
It is no secret that in general, the Apple Mac and Windows worlds simply do not want to get along. Owners of either machine constantly argue about who has the better system, whether it is features or simply the hardware itself.
Moving forward – a look ahead to see what’s available the next generation of IT Professionals
See all related blogs