TrueschoTruescho
All Courses
Exploiting and Securing Vulnerabilities in Java Applications
Coursera
Course
Unknown

Exploiting and Securing Vulnerabilities in Java Applications

University of California, Davis

In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss var

Unknown4 weeks8,571 enrolled

About this Course

In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss var

What You'll Learn

  • Practice protecting against various kinds of cross-site scripting (XSS) attacks.
  • Form plans to mitigate injection vulnerabilities in your web application.
  • Create strategies and controls to provide secure authentication.
  • Examine code to find and patch vulnerable components.

Instructors

J

Joubin Jabbari

Continuing and Professional Education

Course Info

PlatformCoursera
LevelUnknown
PacingUnknown
PriceFree

Skills

Java
Vulnerability Management
Authentications
Git (Version Control System)
Docker (Software)
Exploit development
Java Programming
Authorization (Computing)
Dependency Analysis
Code Review

Start Learning Now