Every registration supports local education. TrainUp Gives Back
Logo

Your Career Training Marketplace

Questions? Call Toll-Free: 1-866-540-9677


When you register for training with TrainUp.com, you are also supporting local education. Find out how.
  • Instant Access ImageInstant Access
    From Anywhere
  • Unlimited Viewing ImageUnlimited
    Viewing
  • calendar Image 6-12 Months
    To Complete

Description

Defensive programming is an approach to programming that attempts to ensure that software still functions under adverse or unforeseen circumstances. In this course, you'll learn how to defend against injection attacks, including SQL, XML, LDAP, and coding attacks. You'll also learn how to handle concurrency.

Learning Objectives
  • Start the course
  • Identify why unsanitized data should not be logged in Java programs
  • Identify why unsanitized data should be excluded from format strings
  • Identify the issues that can occur when handling ZIP and GZIP files in Java
  • Identify how to use input validation in a Java application
  • Identify how to protect regular expressions against regex injection attacks
  • Identify how to prevent SQL injection attacks in Java
  • Identify how to prevent code injections in Java
  • Set up a local LDAP server, create a connection, and populate the server with directory entries
  • Identify how to prevent LDAP injection in Java
  • Identify how to prevent XPath injections in Java
  • Identify how to prevent XML injection attacks in Java
  • Identify how to prevent against XML Entity expansion attacks in Java
  • List the potential problems that path traversal may cause and recognize how to prevent them in Java
  • Handle concurrency securely by avoiding race conditions in Java programs
  • Safely manage concurrency by ensuring safe publication of the members of referenced objects
  • Safely manage concurrency by ensuring proper synchronization semantics
  • Use thread-safety-related annotation in Java programs
  • Use defensive programming techniques to defend against attacks in Java programs
  • Audience

Get the latest industry news, recommended courses, & promotions from TrainUp.com sent straight to your inbox.