Java SE 11 Programmer II: Secure Coding in Java SE 11 Applications
Java
| Intermediate
- 14 videos | 56m 11s
- Includes Assessment
- Earns a Badge
Explore data integrity guidelines, how to enable accessibility and extensibility in Java applications, and how to handle input validation and mutability in this 14-video course examining Java Cryptography Architecture (JCA), Engine classes provided by JCA, Provider class capabilities, and other topics. To begin, discover how to prevent Denial-of-Service in Java applications; secure confidential information in Java applications; and examine guidelines for data integrity, focusing on injections, inclusion, and input validation. Recall how to facilitate accessibility and extensibility in Java applications and how to properly handle input validation and mutability. Explore how to secure sensitive objects, and secure serialization and deserialization in Java. You will describe JCA, including its architecture and the principles surrounding it. Delve into Provider Architecture and capabilities of the Provider class; describe the Engine class and list the Engine classes available in JCA; and learn about key pair generation in Java SE 11. You will also learn about signature management and how to generate and verify signatures using generated keys, and finally, convert unsecure socket code to secure socket code. This is one course is a series to prepare for the 1Z0-816: Java SE 11 Programmer II certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this coursePrevent denial-of-service in java applicationsSecure confidential information in java applicationsDescribe the guidelines for data integrity, with focus on injections, inclusion, and input validationRecall how to facilitate accessibility and extensibility in java applications and how to properly handle input validation and mutabilitySecure sensitive objects in javaSecure serialization and deserialization in java
-
Describe jca, including its architecture and the principles surrounding itDescribe the provider architecture and the capabilities of the provider classDescribe the engine class and list the engine classes available in jcaGenerate key pairs in java se 11Generate and verify signatures using generated keysConvert unsecure socket code to secure socket codeSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 3s
-
2m 51sIn this video, you will learn how to prevent Denial-of-Service in Java applications. FREE ACCESS
-
3m 49sDuring this video, you will learn how to secure confidential information in Java applications. FREE ACCESS
-
3m 1sAfter completing this video, you will be able to describe the guidelines for data integrity, with a focus on injections, inclusion, and input validation. FREE ACCESS
-
3m 18sUpon completion of this video, you will be able to recall how to facilitate accessibility and extensibility in Java applications and how to properly handle input validation and mutability. FREE ACCESS
-
5m 13sLearn how to secure sensitive objects in Java. FREE ACCESS
-
9m 22sDuring this video, you will learn how to secure serialization and deserialization in Java. FREE ACCESS
-
3m 14sAfter completing this video, you will be able to describe JCA, including its architecture and the principles that surround it. FREE ACCESS
-
5m 45sUpon completion of this video, you will be able to describe the Provider Architecture and the capabilities of the Provider class. FREE ACCESS
-
4m 42sUpon completion of this video, you will be able to describe the Engine class and list the Engine classes available in JCA. FREE ACCESS
-
2m 15sIn this video, you will learn how to generate key pairs in Java SE 11. FREE ACCESS
-
4m 6sIn this video, you will learn how to generate and verify signatures using keys that you have generated. FREE ACCESS
-
5m 59sDuring this video, you will learn how to convert insecure socket code to secure socket code. FREE ACCESS
-
1m 34s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.