EC-Council Certified Secure Programmer Java
www.boosturskills.com
www.boosturskills.com
Lets set up Framework
 About EC-Council Secure Programmer Java
 Course Objective.
 What will you learn.
 Prerequisite & Target Audience.
 Exam structure.
.
www.boosturskills.com
EC-Council Certified Secure Programmer
 This course will be invaluable to software developers and programmers alike to
code and develop highly secure applications and web applications. This is done
throughout the software life cycle that involves designing, implementing, and
deployment of applications.
 The course teaches developers how to identify security flaws and implement
security countermeasures throughout the software development life cycle to
improve the overall quality of products and applications.
www.boosturskills.com
EC-Council Certified Secure Programmer
 EC-Council Certified Secure Programmer lays the foundation required by all
application developers and development organizations to produce applications
with greater stability and fewer security risks to the consumer. The Certified
Secure Application Developer standardizes the knowledge base for application
development by incorporating the best practices followed by experienced
experts in the various domains.
 This course is purposefully built with tons of labs peppered throughout the three
days of training, offering participants critical hands on time to fully grasp the new
techniques and strategies in secure programming.
www.boosturskills.com
Course Objective
 This comprehensive course deep drives the reader on:
• How Java security works.
• Its security features.
• Its security policies.
• Its strengths, and weaknesses.
 This course will help in understanding how best a programmer can write code to
optimize application security.
 This course will give basic to advanced knowledge in various aspects of secure
Java development that can effectively prevent hostile and buggy code saving
valuable effort, money, time and reputation of organizations as ‘prevention is
always better than cure’.
www.boosturskills.com
What will you learn
1. Advanced knowledge of Java Security principles through advanced concepts
and secured coding practices.
2. Core Java Security concepts such as Java Security Platform, Sandbox, JVM, Class
loading, Bytecode verifier, Security Manager, security policies as well as Java
Security Framework.
3. Secure Software Development, Threat modelling, Software Security Framework,
Secure Software architectural design, coding, testing, review process techniques
and practices.
4. Secure File Input/Output as well as secure coding in Serialization process, their
best practices, standards and guidelines
www.boosturskills.com
What will you learn
5. Input validation in Java, its various techniques, input validation errors and best
practices in implementing them.
6. Java’s fundamental concepts, the ‘Exceptions’; erroneous behaviour, best coding
practices in avoiding and handling them.
7. Secure Authentication and Authorization .process implementation in Java
applications, their various standard practices and guidelines.
8. Java Authentication and Authorization Service (JAAS), its architecture, Pluggable
Authentication Module (PAM) Framework, access permissions through Java
Security Model
www.boosturskills.com
What will you learn
9. Secure Java Concurrency and Session Management that includes Java Memory
Model, Java Thread Implementation methods, secure coding practices, guidelines
for handling threads, race conditions and deadlocks
10. Core security coding practices of Java Cryptography that includes Encryption,
KeyGenerator, implementation of Cipher Class, Digital Signatures, Secret Keys
and key management
11. Strengths and weaknesses of Java applications, various Java Application
Vulnerabilities namely Cross-Site Scripting (XSS), Cross Site Request Forgery
(CSRF), Directory Traversal vulnerability, HTTP Response Splitting attack,
Parameter Manipulation, Injection Attacks their prevention techniques, secure
coding best practices and countermeasures to avoid Java application
vulnerabilities
www.boosturskills.com
Prerequisite & Target Audience
Prerequisite
 You must be well-versed with JAVA programming
language.
Target Audience
 Students looking for their career in JAVA Programming
 Programmers who are responsible for designing and building
secure Windows/Web based applications with JAVA Framework.
It is designed for developers who have JAVA development skills.
www.boosturskills.com
Exam Framework
 Number of Questions: 50
 Passing Score: 70%
 Test Duration: 2 Hour
 Test Format: Multiple Choice.
 Test Delivery: Online.
 Exam Prefix: 312-94
For More updates & Training calendar Contact/Registers with us @
info@boosturskills.com
Contact us @
Hotline : 18602121211
MOB: +91-9620189898
Landline: 080-25746500
Get Certified , Get Recognized
www.boosturskills.com

EC-Council Secure Programmer Java

  • 1.
    EC-Council Certified SecureProgrammer Java www.boosturskills.com
  • 2.
    www.boosturskills.com Lets set upFramework  About EC-Council Secure Programmer Java  Course Objective.  What will you learn.  Prerequisite & Target Audience.  Exam structure. .
  • 3.
    www.boosturskills.com EC-Council Certified SecureProgrammer  This course will be invaluable to software developers and programmers alike to code and develop highly secure applications and web applications. This is done throughout the software life cycle that involves designing, implementing, and deployment of applications.  The course teaches developers how to identify security flaws and implement security countermeasures throughout the software development life cycle to improve the overall quality of products and applications.
  • 4.
    www.boosturskills.com EC-Council Certified SecureProgrammer  EC-Council Certified Secure Programmer lays the foundation required by all application developers and development organizations to produce applications with greater stability and fewer security risks to the consumer. The Certified Secure Application Developer standardizes the knowledge base for application development by incorporating the best practices followed by experienced experts in the various domains.  This course is purposefully built with tons of labs peppered throughout the three days of training, offering participants critical hands on time to fully grasp the new techniques and strategies in secure programming.
  • 5.
    www.boosturskills.com Course Objective  Thiscomprehensive course deep drives the reader on: • How Java security works. • Its security features. • Its security policies. • Its strengths, and weaknesses.  This course will help in understanding how best a programmer can write code to optimize application security.  This course will give basic to advanced knowledge in various aspects of secure Java development that can effectively prevent hostile and buggy code saving valuable effort, money, time and reputation of organizations as ‘prevention is always better than cure’.
  • 6.
    www.boosturskills.com What will youlearn 1. Advanced knowledge of Java Security principles through advanced concepts and secured coding practices. 2. Core Java Security concepts such as Java Security Platform, Sandbox, JVM, Class loading, Bytecode verifier, Security Manager, security policies as well as Java Security Framework. 3. Secure Software Development, Threat modelling, Software Security Framework, Secure Software architectural design, coding, testing, review process techniques and practices. 4. Secure File Input/Output as well as secure coding in Serialization process, their best practices, standards and guidelines
  • 7.
    www.boosturskills.com What will youlearn 5. Input validation in Java, its various techniques, input validation errors and best practices in implementing them. 6. Java’s fundamental concepts, the ‘Exceptions’; erroneous behaviour, best coding practices in avoiding and handling them. 7. Secure Authentication and Authorization .process implementation in Java applications, their various standard practices and guidelines. 8. Java Authentication and Authorization Service (JAAS), its architecture, Pluggable Authentication Module (PAM) Framework, access permissions through Java Security Model
  • 8.
    www.boosturskills.com What will youlearn 9. Secure Java Concurrency and Session Management that includes Java Memory Model, Java Thread Implementation methods, secure coding practices, guidelines for handling threads, race conditions and deadlocks 10. Core security coding practices of Java Cryptography that includes Encryption, KeyGenerator, implementation of Cipher Class, Digital Signatures, Secret Keys and key management 11. Strengths and weaknesses of Java applications, various Java Application Vulnerabilities namely Cross-Site Scripting (XSS), Cross Site Request Forgery (CSRF), Directory Traversal vulnerability, HTTP Response Splitting attack, Parameter Manipulation, Injection Attacks their prevention techniques, secure coding best practices and countermeasures to avoid Java application vulnerabilities
  • 9.
    www.boosturskills.com Prerequisite & TargetAudience Prerequisite  You must be well-versed with JAVA programming language. Target Audience  Students looking for their career in JAVA Programming  Programmers who are responsible for designing and building secure Windows/Web based applications with JAVA Framework. It is designed for developers who have JAVA development skills.
  • 10.
    www.boosturskills.com Exam Framework  Numberof Questions: 50  Passing Score: 70%  Test Duration: 2 Hour  Test Format: Multiple Choice.  Test Delivery: Online.  Exam Prefix: 312-94
  • 11.
    For More updates& Training calendar Contact/Registers with us @ [email protected] Contact us @ Hotline : 18602121211 MOB: +91-9620189898 Landline: 080-25746500 Get Certified , Get Recognized www.boosturskills.com