Please accept cookies to help us improve this website Is this OK? Yes No More on cookies »
Item number: 108771794

Defensive Programming in Java Training

Item number: 108771794

Defensive Programming in Java Training

159,00 192,39 Incl. tax

Defensive Programming in Java Award-winning E-Learning Training Extensive interactive videos with spoken text Certified teachers Practical exercises Certificate.

Read more
Brand:
Java
Discounts:
  • Buy 2 for €155,82 each and save 2%
  • Buy 3 for €154,23 each and save 3%
  • Buy 4 for €152,64 each and save 4%
  • Buy 5 for €151,05 each and save 5%
  • Buy 10 for €143,10 each and save 10%
  • Buy 25 for €135,15 each and save 15%
  • Buy 50 for €127,20 each and save 20%
Availability:
In stock
Delivery time:
Ordered before 5 p.m.! Start today.
  • Award Winning E-learning
  • Lowest price guarantee
  • Personalized service by our expert team
  • Pay safely online or by invoice
  • Order and start within 24 hours

Defensive Programming in Java E-Learning

Order this amazing, award-winning Defensive Programming in Java E-Learning course online, 1 year 24/7 access to extensive interactive videos, speeches, hands-on tasks and progress monitoring. After the course you will receive a certificate of attendance. Defensive programming is an approach to programming that attempts to ensure that software still functions under adverse or unforeseen circumstances. This learning path covers how to code defensively in Java. It covers how to use assertions and annotations, how to implement classes and methods and program flow securely, as well as how to avoid denial of service attacks and injection attacks. Finally, it also covers how to handle data securely, manage concurrency effectively, and use access control to provide safe and effective applications.

Course content

Introduction to Defensive Programming

Course: 8 Minutes

  • Course Introduction
  • Defensive Coding in Java

Using Assertions and Annotations

Course: 16 Minutes

  • Assertions
  • Annotations

Methods

Course: 15 Minutes

  • Defensible Methods
  • Working with Untrusted Parameters
  • Checking Return Values

Types and Operations

Course: 45 Minutes

  • Conversions and Promotions
  • Issues with Floating Point Values
  • Integer Overflow Vulnerability
  • Issues with Operations
  • Strings and Variable-Width Encodings
  • Strings and Noncharacter Data
  • Strings and Locale-dependent Data
  • The Value of Null

Classes and Objects

Course: 34 Minutes

  • Working with Classes
  • Working with Constructors
  • Issues with Mutability
  • Serialization and Deserialization
  • Object and Reference Equality

Program Flow Control and Collections

Course: 34 Minutes

  • Conditional Expressions
  • Assignments and Conditional Expressions
  • Bitwise and Logical Operators
  • Working with Enhanced for Loop
  • Working with Collections

Errors, Resources, and Terminations

Course: 20 Minutes

  • Utilizing Exceptions Correctly
  • Denial-of-Service Attacks
  • Releasing Resources
  • Terminating Programs

Practice: Creating Defensible Code

Course: 8 Minutes

  • Exercise: Code Defensively in Java

Working with Data

Course: 42 Minutes

  • Course Introduction
  • Logging Data
  • Unsanitized Data and Format Strings
  • Working with ZIP Files
  • Validating Input
  • Using Regular Expressions

Defending against Attacks

Course: 1 Hour, 23 Minutes

  • SQL Injection Attacks
  • Preventing Code Injections
  • Setting Up an LDAP Server
  • Preventing LDAP Injection
  • Preventing XPath Injections
  • Preventing XML Injections
  • XML Entity Expansion Attacks
  • Defending against Path Traversal Attacks

Concurrency

Course: 31 Minutes

  • Race Conditions in Concurrent Programming
  • Guaranteeing Safe Publication
  • Working with Synchronization Semantics
  • Using Thread-Safety-Related Annotations

Practice: Defending Against Attacks

Course: 9 Minutes

  • Exercise: Defending Against Attacks

Secure Communications and Access Control

Course: 56 Minutes

  • Course Introduction
  • Secure Network Communications
  • Permissions and Callback Methods
  • Working with doPrivileged
  • Containers
  • Creating a Custom Security Policy File
  • Working with Contexts
  • Callers and Access Considerations

Protecting Data

Course: 34 Minutes

  • Handling Sensitive Data
  • Secure Password Storage
  • Coding a User Authentication Database
  • Coding and Testing Secure User Authentication

Practice: Securing a Java Application

Course: 9 Minutes

  • Exercise: Securing Access
Language English
Qualifications of the Instructor Certified
Course Format and Length Teaching videos with subtitles, interactive elements and assignments and tests
Lesson duration 7:24 Hours
Progress monitoring Yes
Access to Material 365 days
Technical Requirements Computer or mobile device, Stable internet connections Web browsersuch as Chrome, Firefox, Safari or Edge.
Support or Assistance Helpdesk and online knowledge base 24/7
Certification Certificate of participation in PDF format
Price and costs Course price at no extra cost
Cancellation policy and money-back guarantee We assess this on a case-by-case basis
Award Winning E-learning Yes
Tip! Provide a quiet learning environment, time and motivation, audio equipment such as headphones or speakers for audio, account information such as login details to access the e-learning platform.

There are no reviews written yet about this product.

Loading...

OEM Office Elearning Menu Genomineerd voor 'Beste Opleider van Nederland'

OEM Office Elearning Menu is trots genomineerd te zijn voor de titel 'Beste Opleider van Nederland' door Springest, een onderdeel van Archipel. Deze erkenning bevestigt onze kwaliteit en toewijding. Hartelijk dank aan al onze cursisten.

Reviews

There are no reviews written yet about this product.

25.000+

Deelnemers getrained

Springest: 9.1 - Edubookers 8.9

Gemiddeld cijfer

3500+

Aantal getrainde bedrijven

20+

Jaren ervaring

Even more knowledge

Read our most recent articles

View blog