-
Working with Collections
After watching this video; you will be able to identify how to use collections safely in Java programs.
-
Denial of Service Attacks
After watching this video; you will be able to identify how denial of service attacks can occur.
-
Preventing Code Injections
After watching this video; you will be able to identify how to prevent code injections in Java.
-
Assignments and Conditional Expressions
After watching this video; you will be able to identify how to avoid assignments in conditional expression for defensive programming in Java.
-
Bitwise and Logical Operators
After watching this video; you will be able to identify how to distinguish and use bitwise and logical operators in conditional expressions.
-
Callers and Access Considerations
After watching this video; you will be able to identify permission issues with callers that you need to consider when programming defensively in Java.
-
Checking Method Return Values
After watching this video; you will be able to apply secure checks on method return values.
-
Coding and Testing Secure User Authentication
After watching this video; you will be able to implement and test secure user authentication.
-
Conditional Expressions
After watching this video; you will be able to identify how to use conditional expressions when coding defensively.
-
Conversions and Promotions
After watching this video; you will be able to identify issues with conversions to narrower types in Java and identify issues with promotions such as long to double.
-
Creating a Custom Security Policy File
After watching this video; you will be able to create a custom security policy file to grant permissions in Java.
-
Defending Against Attacks
After watching this video; you will be able to use defensive programming techniques to defend against attacks in Java programs.
-
Features of Defensive Coding
After watching this video; you will be able to recognize the key features of defensive coding in Java.
-
Handling Sensitive Data
After watching this video; you will be able to identify how to code defensively to avoid compromising data confidentiality.
-
Integer Overflow Vulnerability
After watching this video; you will be able to recognize what integer overflow is and how to prevent it.
-
Issues with Floating Point Values
After watching this video; you will be able to identify issues with floating point values.
-
Issues with Mutability
After watching this video; you will be able to identify issues with mutability in Java classes.
-
Issues with Operations
After watching this video; you will be able to identify issues with arithmetic operations in Java programs.
-
Logs and Unsanitized Data
After watching this video; you will be able to identify why unsanitized data should not be logged in Java programs.
-
Object and Reference Equality
After watching this video; you will be able to identify the difference between abstract object and reference equality in Java programs.
-
Password Storage
After watching this video; you will be able to use secure password storage.
-
Permissions and Callback Methods
After watching this video; you will be able to identify permission issues with callback methods that you need to consider when programming defensively in Java.
-
Preventing LDAP Injection
After watching this video; you will be able to identify how to prevent LDAP injection in Java.
-
Preventing XML Injections
After watching this video; you will be able to identify how to prevent XML injection attacks in Java.
-
Preventing XPath Injections
After watching this video; you will be able to identify how to prevent Xpath injections in Java.
-
Race Conditions in Concurrent Programming
After watching this video; you will be able to handle concurrency securely by avoiding race conditions in Java programs.
-
Safe Concurrency
After watching this video; you will be able to handle concurrency securely by ensuring proper synchronization; happen-before; and safe publication semantics.
-
Secure Network Communications
After watching this video; you will be able to implement Secure Network Communications in Java programs.
-
Secure User Authentication
After watching this video; you will be able to securely authenticate users in a Java application.
-
Securing Access
After watching this video; you will be able to use defensive coding techniques in communication; authorization and access control to create a secure Java application.
-
Serialization and Deserialization
After watching this video; you will be able to identify how to work defensively with serialization and deserialization in Java.
-
Setting Up an LDAP Server
After watching this video; you will be able to set up a local LDAP server; create a connection; and populate the server with directory entries.
-
SQL Injection Attacks
After watching this video; you will be able to identify how to prevent SQL injection attacks in Java.
-
Strings and Locale-Depedent Data
After watching this video; you will be able to identify issues with using strings to compare locale-dependent data.
-
Strings and Noncharacter Data
After watching this video; you will be able to identify issues with encoding non-character data as a string.
-
Terminating Programs
After watching this video; you will be able to identify how to corrrectly terminate Java programs.
-
The Value of Null
After watching this video; you will be able to identify how to use null values in creating defendable code.
-
Unsanitized Data and Format Strings
After watching this video; you will be able to identify why unsanitized data should be excluded from format strings.
-
Untrusted Method Parameters
After watching this video; you will be able to identify the techniques for applying defensive techniques for method parameters and return values in Java methods.
-
Using Thread-Safety-Related Annotations
After watching this video; you will be able to use thread-safety-related annotation in Java programs.
-
Utilizing Exceptions Correctly
After watching this video; you will be able to demonstrate how to use exceptions appropriately in Java to handle errors.
-
Working with Constructors
After watching this video; you will be able to identify how to work defensively with constructors in Java.
-
Working with Contexts
After watching this video; you will be able to identify permission issues with contexts that you need to consider when programming defensively in Java.
-
Working with doPrivileged
After watching this video; you will be able to identify access control issues with java.security.AccessController.doPrivileged in Java programs.
-
Working with Loops
After watching this video; you will be able to identify how to work with loops correctly in Java to avoid unintentional wrapping of loop counters.
-
Working with Strings
After watching this video; you will be able to identify how to work with strings in Java programs.
-
Working with Synchronization Semantics
After watching this video; you will be able to identify issues with dynamic SQL in Java applications.
-
Working with Zip Files
After watching this video; you will be able to identify the issues that can occur when handling ZIP and GZIP files in Java.
-
XML Entity Expansion Attacks
After watching this video; you will be able to identify how to prevent againts XML entity expansion attacks in Java.
-
Defending against Path Traversal Attacks
After watching this video; you will be able to list the potential problems that path traversal may cause and recognize how to prevent them in Java.
-
Annotations
After watching this video; you will be able to use annotations in Java programming code.
-
Assertions
After watching this video; you will be able to use assertions in your Java programming code.
-
Defensible Methods
After watching this video; you will be able to create examples of defensible methods in Java.
-
Validating Input
After watching this video; you will be able to identify how to use input validation in a Java application.
-
Releasing Resources
After watching this video; you will be able to identify how to manage resources safely in Java.
-
Containers
After watching this video; you will be able to identify how to use containers securely in Java.
-
Using Regular Expressions
After watching this video; you will be able to identify how to use and protect regular expressions to help in input validation.
-
Code Defensively in Java
After watching this video; you will be able to use defensive programming techniques in Java programs.
-
Working with Classes
After watching this video; you will be able to identify how to work with classes to create defendable code.