Java SE 11 Programmer II: Secure Coding in Java SE 11 Applications

Java    |    Intermediate
  • 14 videos | 56m 11s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 614 users Rating 4.4 of 614 users (614)
Explore data integrity guidelines, how to enable accessibility and extensibility in Java applications, and how to handle input validation and mutability in this 14-video course examining Java Cryptography Architecture (JCA), Engine classes provided by JCA, Provider class capabilities, and other topics. To begin, discover how to prevent Denial-of-Service in Java applications; secure confidential information in Java applications; and examine guidelines for data integrity, focusing on injections, inclusion, and input validation. Recall how to facilitate accessibility and extensibility in Java applications and how to properly handle input validation and mutability. Explore how to secure sensitive objects, and secure serialization and deserialization in Java. You will describe JCA, including its architecture and the principles surrounding it. Delve into Provider Architecture and capabilities of the Provider class; describe the Engine class and list the Engine classes available in JCA; and learn about key pair generation in Java SE 11. You will also learn about signature management and how to generate and verify signatures using generated keys, and finally, convert unsecure socket code to secure socket code. This is one course is a series to prepare for the 1Z0-816: Java SE 11 Programmer II certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Prevent denial-of-service in java applications
    Secure confidential information in java applications
    Describe the guidelines for data integrity, with focus on injections, inclusion, and input validation
    Recall how to facilitate accessibility and extensibility in java applications and how to properly handle input validation and mutability
    Secure sensitive objects in java
    Secure serialization and deserialization in java
  • Describe jca, including its architecture and the principles surrounding it
    Describe the provider architecture and the capabilities of the provider class
    Describe the engine class and list the engine classes available in jca
    Generate key pairs in java se 11
    Generate and verify signatures using generated keys
    Convert unsecure socket code to secure socket code
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 3s
  • 2m 51s
    In this video, you will learn how to prevent Denial-of-Service in Java applications. FREE ACCESS
  • Locked
    3.  Securing Information
    3m 49s
    During this video, you will learn how to secure confidential information in Java applications. FREE ACCESS
  • Locked
    4.  Managing Data Integrity
    3m 1s
    After completing this video, you will be able to describe the guidelines for data integrity, with a focus on injections, inclusion, and input validation. FREE ACCESS
  • Locked
    5.  Accessibility and Extensibility
    3m 18s
    Upon completion of this video, you will be able to recall how to facilitate accessibility and extensibility in Java applications and how to properly handle input validation and mutability. FREE ACCESS
  • Locked
    6.  Securing Objects
    5m 13s
    Learn how to secure sensitive objects in Java. FREE ACCESS
  • Locked
    7.  Serialization and Deserialization Security
    9m 22s
    During this video, you will learn how to secure serialization and deserialization in Java. FREE ACCESS
  • Locked
    8.  JCA and its Principles
    3m 14s
    After completing this video, you will be able to describe JCA, including its architecture and the principles that surround it. FREE ACCESS
  • Locked
    9.  Provider Architecture
    5m 45s
    Upon completion of this video, you will be able to describe the Provider Architecture and the capabilities of the Provider class. FREE ACCESS
  • Locked
    10.  Engine Class
    4m 42s
    Upon completion of this video, you will be able to describe the Engine class and list the Engine classes available in JCA. FREE ACCESS
  • Locked
    11.  Key Pair Generation
    2m 15s
    In this video, you will learn how to generate key pairs in Java SE 11. FREE ACCESS
  • Locked
    12.  Signature Management
    4m 6s
    In this video, you will learn how to generate and verify signatures using keys that you have generated. FREE ACCESS
  • Locked
    13.  Unsecure to Secure Socket
    5m 59s
    During this video, you will learn how to convert insecure socket code to secure socket code. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 34s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 526 users Rating 4.5 of 526 users (526)
Rating 4.7 of 100 users Rating 4.7 of 100 users (100)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 434 users Rating 4.5 of 434 users (434)
Rating 4.5 of 162 users Rating 4.5 of 162 users (162)
Rating 4.5 of 305 users Rating 4.5 of 305 users (305)