Companies Home Search Profile

Secure Coding and Design Best Practices in Java

Focused View

Basics Strong

3:04:49

78 View
  • 1. Introduction to the Course.mp4
    08:41
  • 1. Introduction to Secure Coding.mp4
    05:06
  • 2. Scope.mp4
    02:15
  • 3. Who Should Buy.mp4
    01:59
  • 4. Resources.html
  • 1. What Are Secure Design Principles.mp4
    06:44
  • 2. Economy of mechanism.mp4
    05:24
  • 3. Fail Safe Defaults.mp4
    03:42
  • 4. Complete Mediation.mp4
    04:21
  • 5. Open Design.mp4
    02:07
  • 6. Least Privilege.mp4
    02:03
  • 7. Psychological Acceptability.mp4
    03:02
  • 8. Separation of Privilege.mp4
    04:35
  • 9. Least Common Mechanism.mp4
    05:32
  • 10. Work Factor.mp4
    02:24
  • 11. Compromise Recording.mp4
    02:28
  • 12. Wrok Factor.mp4
    02:43
  • 1. Introduction.mp4
    02:39
  • 2. Strong Authentication.mp4
    01:50
  • 3. Strong Authentication Demo.mp4
    11:34
  • 4. Strong Authentication Measures.mp4
    02:21
  • 5. Access Control.mp4
    09:27
  • 6. Demo Importance of Secured Access Control.mp4
    06:14
  • 7. Secure Configuration.mp4
    01:40
  • 8. Demo Secure Configuration - Java.mp4
    06:00
  • 9. Sensitive Data Protection.mp4
    02:39
  • 10. Demo Sensitive Data Protection.mp4
    03:29
  • 11. Relying on Trusted Components.mp4
    02:31
  • 12. Relying on Trusted Components Demo Java.mp4
    06:23
  • 13. Serialization and Deserialization.mp4
    02:25
  • 14. Serialization and Deserialization Demo - Java.mp4
    08:53
  • 15. Precise Logging And Monitoring.mp4
    02:28
  • 16. Precise Logging And Monitoring Demo - Java.mp4
    03:28
  • 17. Server Side Request Validations.mp4
    03:34
  • 18. Injection And inclusion.mp4
    04:44
  • 19. Demo Injection.mp4
    07:26
  • 20. Other Things to be careful About.mp4
    03:58
  • 21. Summary.html
  • 1. OWASP 10.mp4
    04:36
  • 2. OWASP Link.html
  • 3. OWASP 10 - Demo.mp4
    12:00
  • 1. Setting up Product Development Model and Lifecycle.mp4
    06:11
  • 2. Analysis of written code.mp4
    01:19
  • 3. Analysis of written code Helper Tools.html
  • 4. Corrections in Code or design.mp4
    00:54
  • 5. Timely vulnerability checkups and Security Trainings.mp4
    01:46
  • 6. OWASP Dependency Check.html
  • 7. Summary.mp4
    01:14
  • 1. Course Summary and Thank you.html
  • Description


    Secure Coding in Java with Design Principles and practice - Quick Start Course

    What You'll Learn?


    • Secure Coding Principles
    • Secure Coding in Java with some examples
    • Manage security in Code
    • Secure coding in Java with examples

    Who is this for?


  • Java Programmers who want to learn secure coding
  • What You Need to Know?


  • Java Beginners level is required
  • More details


    Description


    Secure Coding and Design Practice in Java

    ----------------------------------------------


    Secure coding is a way of writing computer programs that makes them less vulnerable to security threats like hacking and viruses or data leaks.

    When we write software, we want to make sure it is built in a way that keeps it safe from the attackers who might want to break in and do real bad things, like steal information or cause damage to the application or data.

    One of the rough truth is that new vulnerabilities are constantly being discovered, which can compromise the security of software systems. This means that even if a software application was secure at one point in time, it may become vulnerable to attack as new weaknesses are identified and exploited by attackers.

    What is the way to achieve this?

    The answer is we have to follow certain guidelines and best practices at every stage of development that help us identify and address potential security risks. By doing this, we can better protect sensitive data and prevent unauthorised access or manipulation of the software by attackers.Also, focussing on applications security and updating the application time to time as per the updating security standards.

    It's essential to prioritise secure coding practices because most businesses today rely on software to run their operations. Software can either be custom-made specifically for the business or purchased from other companies. Building software can be a time-consuming and costly process, but unfortunately, the security of the software often doesn't receive enough attention

    It is not part of day to day programming by developers. There are a few challenges that architects and developers face to achieve code security:

    Lack of knowledge:

    Many new developers may not have a comprehensive understanding of secure coding practices and may not be aware of the potential vulnerabilities in their code.

    Limited resources:

    Small teams or individual developers may not have the resources to implement complex security measures or to conduct thorough testing of their code.

    Time constraints: Developers may be under pressure to deliver code quickly, which can lead to shortcuts being taken and security being overlooked.

    Evolving threats:

    The security landscape is constantly changing, and new threats can emerge quickly. Developers need to stay up-to-date with the latest threats and vulnerabilities to ensure that their code remains secure.

    Compatibility issues:

    Secure coding can sometimes conflict with other requirements, such as compatibility with legacy systems or third-party software, which can make it difficult to implement.

    These are the challenges faced during the development. The best solution to this is to know the security practices prior to start a new development so that they can be taken in consideration from the very start.This means making sure that all developers understand the basics of secure coding practices and that security is considered throughout the development process Developers should educate themselves on secure coding practices and keep themselves updated with new security vulnerabilities and their solutions.


    TOC :

    1. OnBoarding

    2. Introduction of Secure Coding

    3. Secure Design

    4. Understanding the RISKS

    5. Security Management

    6. Summary

    7.  Appendix

    Who this course is for:

    • Java Programmers who want to learn secure coding

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Basics Strong
    Basics Strong
    Instructor's Courses
    Hi,We are a team of technocrats from IITs who work for solving problems through technology. We work on mission critical projects in AI, Machine Learning, BlockChain as domain and Java, Python, JavaScript and a lot of tools and technologies in technology space.We all as a group love to code and Program.We believe in strong foundation that's why we create courses which helps us students and professionals to build their Basics. Strong foundation and basics of programming concepts can lead to solve any technical problem and to excel in the career. That's why we as a team  thinks everyday how to make the complicated concepts easy to learn. All our courses are practical and with hands-on examples and comprehensive working files. All Our videos are created after a  comprehensive  research and reviews.Happy Learning! and All The Best for a Great Foundation!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 43
    • duration 3:04:49
    • Release Date 2023/07/22

    Courses related to Java

    Subtitle
    Java Programming: Step by Step from A to Z
    Subtitle
    Fundamentals of JDBC
    UdemyFundamentals of JDBC
    2:12:11
    English subtitles
    03/30/2024
    Subtitle
    Struts 2 Framework for Beginners
    Udemy Abhay Redkar
    Abhay Redkar
    Struts 2 Framework for Beginners
    8:05:03
    English subtitles
    05/19/2024