Data Security and Access Control

Java 8    |    Intermediate
  • 12 videos | 1h 33m 10s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 340 users Rating 4.5 of 340 users (340)
Defensive programming in Java includes writing code to handle and protect data. Explore how to secure communications, and implement access control and authentication effectively.

WHAT YOU WILL LEARN

  • Implement secure network communications in java programs
    Identify permission issues with callback methods that you need to consider when programming defensively in java
    Identify access control issues with  java.security.accesscontroller.doprivileged in java programs
    Identify how to use containers securely in java
    Create a custom security policy file to grant permissions in java
    Identify permission issues with contexts that you need to consider when programming defensively in java
  • Identify permission issues with callers that you need to consider when programming defensively in java
    Identify how to code defensively to avoid compromising data confidentiality
    Use secure password storage
    Review a database that stores user authentication data and write code that can be used to connect and communicate with the database
    Implement and test secure user authentication
    Use defensive coding techniques in communication, authorization and access control to create a secure java application

IN THIS COURSE

  • 12m 42s
    In this video, find out how to implement secure network communications in Java programs. FREE ACCESS
  • 3m 37s
    Find out how to identify permission issues with callback methods that you need to consider when programming defensively in Java. FREE ACCESS
  • Locked
    3.  Working with doPrivileged
    3m 54s
    Find out how to identify access control issues with java.security.AccessController.doPrivileged in Java programs. FREE ACCESS
  • Locked
    4.  Containers
    3m 42s
    In this video, you will learn how to use containers securely in Java. FREE ACCESS
  • Locked
    5.  Creating a Custom Security Policy File
    7m 58s
    In this video, find out how to create a custom security policy file to grant permissions in Java. FREE ACCESS
  • Locked
    6.  Working with Contexts
    9m 13s
    During this video, you will learn how to identify permission issues with contexts that you need to consider when programming defensively in Java. FREE ACCESS
  • Locked
    7.  Callers and Access Considerations
    9m 54s
    In this video, you will identify permission issues with callers that you need to consider when programming defensively in Java. FREE ACCESS
  • Locked
    8.  Handling Sensitive Data
    5m 48s
    In this video, you will learn how to code defensively to avoid compromising data confidentiality. FREE ACCESS
  • Locked
    9.  Secure Password Storage
    12m 15s
    This video will show you how to store passwords securely. FREE ACCESS
  • Locked
    10.  Coding a User Authentication Database
    7m 31s
    During this video, you will learn how to review a database that stores user authentication data and write code that can be used to connect to and communicate with the database. FREE ACCESS
  • Locked
    11.  Coding and Testing Secure User Authentication
    7m 9s
    Find out how to implement and test secure user authentication. FREE ACCESS
  • Locked
    12.  Exercise: Securing Access
    9m 28s
    In this video, you will use defensive coding techniques for communication, authorization, and access control to create a secure Java application. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 160 users Rating 4.5 of 160 users (160)
Rating 4.4 of 155 users Rating 4.4 of 155 users (155)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 238 users Rating 4.5 of 238 users (238)
Rating 4.6 of 18 users Rating 4.6 of 18 users (18)
Rating 4.5 of 354 users Rating 4.5 of 354 users (354)