SETC Training844-434-7382
 Find a Course: 
 
Programming TrainingMicrosoft TrainingMS Office TrainingServer TrainingManagement TrainingNetwork TrainingAbout UsContact Us

Java Training


The course was very helpful for my career. It opened up my eyes on how the web has evolved. I would recommend this course to my colleagues.
Comment from Canada Revenue Agency

1. Title

  • Java Security Workshop (JSECU, 4 days)
    View PDF

2. Course Pre-requisites

  • Knowledge of the Java programming language and the Class Library is essential

3. Target Audience

  • Developer who need to develop or maintain secure Java applications

4. Dates and Pricing


Oct 17 to Oct 20, 2017$2,250.00/person

5. Outline

Module 1: The Java Security Framework

Topic 1: The Need for a Robust Security Framework

Topic 2: Protecting Enterprise Resources

Topic 3: Java SE Security Model

Topic 4: About the Security Model

Topic 5: Users, Groups and Roles

Topic 6: About Securing Resources

Topic 7: Authentication

Topic 8: Web Application Security

Topic 9: Implementing Security

Module 2: BEA WebLogic Server Security

Topic 1: Security Framework Overview

Topic 2: JAAS

Topic 3: Subjects and Principals

Topic 4: Security Realms

Topic 5: About Roles

Topic 6: Security Providers

Module 3: Web Application Security

Topic 1: Security Threats and Vulnerabilities

Topic 2: Types of Attacks

Topic 3: Digital Signatures

Topic 4: Certificates

Topic 5: Secure Sockets Layer (SSL)

Topic 6: Public Key Infrastructure (PKI)

Topic 7: Antivirus Products, Firewalls and Sniffers

Module 4: Web Application Security Best Practices

Topic 1: The Security Policy

Topic 2: Security Updates

Topic 3: Keys and Certificates

Topic 4: Logging and Auditing

Module 5: Securing WebLogic Server Applications

Topic 1: The Default Realm

Topic 2: Selecting a Realm

Topic 3: Creating Users and Groups

Topic 4: Global Roles

Topic 5: Scoped Roles

Topic 6: Security Policies

Topic 7: The Lightweight Directory Access Protocol (LDAP)

Topic 8: External LDAP Servers

Topic 9: JNDI Authentication

Module 6: JMS Security

Topic 1: Overview of JMS Security

Topic 2: JMS Security Architecture

Topic 3: Authentication

Topic 4: Authorization

Topic 5: Roles

Topic 6: Using Encryption: Java Encryption Extensions

Module 7: JAAS

Topic 1: Overview

Topic 2: JAAS Configuration

Topic 3: Callback Handlers

Topic 4: Using LoginContext

Topic 5: Writing the Code

Topic 6: Executing the Code

Module 8: Creating a Custom Security Provider

Topic 1: The SecurityProvider Interface

Topic 2: The AuthenticationProvider Interface

Topic 3: The LoginModule Interface

Topic 4: WebLogic Definition Files

Topic 5: Building and Deploying Custom Security Providers

Module 9: SSL

Topic 1: Digital Certificates

Topic 2: Server Authentiation

Topic 3: Mutual Authentication

Topic 4: Establishing Domain Trusts

Module 10: Best Practices

Topic 1: User Lockout

Topic 2: Connection Filtering

Topic 3: Advisories and Notifications

Topic 4: Machine Security

Topic 5: File System Security

Topic 6: Network Connections

Topic 7: DOS Attacks

Topic 8: Tuning and Auditing

SETC Training on LinkedIn follow @CTESTraining Follow us on Facebook
  Programming Training
  Microsoft Training
  Network Training
  Management Training
  Server Training
  Microsoft Office Training
Site developed and authored by Jean-Marc Choquette