Today, Java is embedded in more than 3 billion devices such as laptops, data centers, game consoles, super computers, mobile phones, smart cards, and many more. Java is widely adopted because of its platform and architecture independent characteristics that encourages developers and industry alike.
ECSP-Java is comprehensive course that provides hands-on training covering Java security features, policies, strengths, and weaknesses. It helps developers understand how to write secure and robust Java applications and provides advanced knowledge in various aspects of secure Java development that can effectively prevent hostile and buggy code. The end result of security Java coding practices include saving valuable effort, money, time, and possibly the reputation of organizations using Javacoded applications.
What Will You Learn?
Students in this course will acquire knowledge in the following areas:
- Java security principles and secure coding practices
- Java Security Platform, Sandbox, JVM, Class loading, Bytecode verifier, Security Manager, security policies, and Java Security Framework
- Secure Software Development Lifecycle, threat modelling, software security frameworks, and secure software architectures
- Best practices and standards and guidelines for secure file input/output and serialization
- Java input validation techniques, validation errors, and best practices
- Java exceptions, erroneous behaviors, and the best practices to handle or avoid them
- Secure authentication and authorization processes
- Java Authentication and Authorization Service (JAAS), its architecture, Pluggable Authentication Module (PAM) Framework, and access permissions through Java Security Model
- Secure Java concurrency and session management that includes Java Memory Model, Java Thread Implementation methods, secure coding practices, and guidelines for handling threads, race conditions, and deadlocks
- Core security coding practices of Java Cryptography that includes Encryption, KeyGenerator, implementation of Cipher Class, Digital Signatures, Secret Keys, and key management
- Various Java application vulnerabilities such as Cross-Site Scripting (XSS), Cross Site Request Forgery (CSRF), Directory Traversal vulnerability, HTTP Response Splitting attack, Parameter Manipulation, Injection Attacks and their countermeasures
- Coding testing and review techniques and practices
Acquire secure coding JAVA programming skills with ECSP JAVA certification
You must be well-versed with Java programming language.
Who Should Attend
The ECSP certication is intended for programmers who are responsible for designing and building secure Windows/Web based applications with Java. It is designed for developers who have Java development skills.
Couse/ Class Duration
3 Days (9:00 AM – 5:00 PM)
Number of Questions: 50
Passing Score: 70%
Test Duration: 2 Hours
Test Format: Multiple Choice
Test Delivery: EC-Council Exam Center
Exam Prefix: 312-94
The ECSP Java 312-94 exam will be conducted on the last day of training. Students need to pass the online exam to receive the ECSP certi cation.