OWASP Top 10, Java Secure Coding Follow Up Training in Sweden

  • Learn via: Classroom
  • Duration: 1 Day
  • Price: Please contact for booking options
We can host this training at your preferred location. Contact us!

This course is the next step for our participants, who completed our OWASP Top 10, Java Secure Coding Fundamentals course. This is a follow up training, meaning that in order to attend this, everyone must already have the knowledge that is covered in the Fundamentals.

This course enables our participants to gain a deeper knowledge in the field, because here we emphasize the Java-specific aspects of secure coding instead of the general vulnerabilities.

At the end of the training everyone has the possibility to take an exam, where they are able to measure their level of the gained knowledge.

  • Learn client-side vulnerabilities and secure coding practices
  • Have a practical understanding of cryptography
  • Learn to use various security features of the Java development environment

  • Client-side security
  • Practical cryptography
  • Secure communication in Java
  • Java security services


Client-side security

  • JavaScript security
  • Same Origin Policy
  • Simple requests
  • Preflight requests
  • Exercise – Client-side authentication
  • Client-side authentication and password management
  • Protecting JavaScript code
  • Clickjacking
    • Clickjacking
    • Exercise – IFrame, Where is My Car?
    • Protection against Clickjacking
    • Anti frame-busting – dismissing protection scripts
    • Protection against busting frame busting
  • AJAX security
    • XSS in AJAX
    • Script injection attack in AJAX
    • Exercise – XSS in AJAX
    • XSS protection in AJAX
    • Exercise CSRF in AJAX – JavaScript hijacking
    • CSRF protection in AJAX

Practical cryptography

  • Rule #1 of implementing cryptography
  • Cryptosystems
    • Elements of a cryptosystem
    • Java Cryptography Architecture / Extension (JCA/JCE)
    • Using Cryptographic Service Providers
  • Symmetric-key cryptography
    • Providing confidentiality with symmetric cryptography
    • Symmetric encryption algorithms
    • Modes of operation
    • Private (symmetric) key cryptography in Java
  • Other cryptographic algorithms
    • Hash or message digest
    • Hash algorithms
    • SHAttered
    • Hashing in Java: MessageDigest class
    • MAC and password-based encryption in Java: Mac class
    • Message Authentication Code (MAC)
    • Providing integrity and authenticity with a symmetric key
    • Random number generation
      • Random numbers and cryptography
      • Cryptographically-strong PRNGs
      • Weak and strong PRNGs in Java
      • Hardware-based TRNGs
      • Exercise RandomTest
      • Using random numbers in Java – spot the bug!
  • Asymmetric (public-key) cryptography
    • Providing confidentiality with public-key encryption
    • Rule of thumb – possession of private key
    • The RSA algorithm
      • Introduction to RSA algorithm
      • Encrypting with RSA
      • Combining symmetric and asymmetric algorithms
      • Digital signing with RSA
      • Exercise Sign
  • Public Key Infrastructure (PKI)
    • Man-in-the-Middle (MitM) attack
    • Digital certificates against MitM attack
    • Certificate Authorities in Public Key Infrastructure
    • X.509 digital certificate
    • The Java Keystore (JKS)
    • Java Certification Path (CertPath)

Secure communication in Java

  • SSL and TLS
  • Usage options
  • Security services of TLS
  • SSL/TLS handshake

Java security services

  • Java security services – architecture


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Sweden facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
03 borgemánnu 2024
Stockholm, Malmö, Göteborg
1 Day
Classroom / Virtual Classroom
17 borgemánnu 2024
Stockholm, Malmö, Göteborg
1 Day
Classroom / Virtual Classroom
21 čakčamánnu 2024
Stockholm, Malmö, Göteborg
1 Day
Classroom / Virtual Classroom
26 čakčamánnu 2024
Stockholm, Malmö, Göteborg
1 Day
Classroom / Virtual Classroom
26 čakčamánnu 2024
Stockholm, Malmö, Göteborg
1 Day
Classroom / Virtual Classroom
06 golggotmánnu 2024
Stockholm, Malmö, Göteborg
1 Day
Classroom / Virtual Classroom
08 golggotmánnu 2024
Stockholm, Malmö, Göteborg
1 Day
Classroom / Virtual Classroom
27 golggotmánnu 2024
Stockholm, Malmö, Göteborg
1 Day
OWASP Top 10, Java Secure Coding Follow Up Training Course in Sweden

Sweden is a Nordic country that borders Norway, Finland and Denmark. The name "Sweden" originated from the "Svear", a people mentioned by the Roman author Tacitus. While being the largest Nordic country, Sweden is the fifth-largest country in Europe. Sweden has a total population of 10.4 million. The capital and largest city is Stockholm. About 15 percent of the country lies within the Arctic Circle, so that's why from May until mid-July, sunlight lasts all day in the north of the Arctic Circle. On the other hand, during December, the capital citt experiences only about 5.5 hours of daylight.

When in Sweden, visiting Stockholm's Old Town Gamla Stan, Sweden's most popular museum Vasa Museum and a UNESCO World Heritage Site; Drottningholm Palace is highly recommended.

Empower yourself with our extensive selection of IT courses, covering programming, data analytics, software development, business skills, cloud computing, cybersecurity, project management. Experience personalized training and expert guidance from our instructors, who will come to your chosen training venue anywhere in Sweden.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.