Exploiting and Securing Vulnerabilities in Java Applications, Certificate | Part time online | Coursera | United States
1 days
Duration
Free
Free
Unknown
Tuition fee
Anytime
Unknown
Apply date
Anytime
Unknown
Start date

About

This Exploiting and Securing Vulnerabilities in Java Applications course offered by Coursera in partnership with UC Davis is part of the Secure Coding Practices Specialization. When you enroll in this course, you'll also be enrolled in this Specialization.

Visit the Visit programme website for more information

Overview

In this Exploiting and Securing Vulnerabilities in Java Applications course offered by Coursera in partnership with UC Davis, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss various mitigation strategies. We do this by exploiting WebGoat, an OWASP project designed to teach penetration testing. WebGoat is a deliberately vulnerable application with many flaws and we take aim at fixing some of these issues. Finally we fix these issues in WebGoat and build our patched binaries. Together we will discuss online resources to help us along and find meaningful ways to give back to the larger Application Security community.

What you'll learn

  • Practice protecting against various kinds of cross-site scripting (XSS) attacks.

  • Form plans to mitigate injection vulnerabilities in your web application.

  • Create strategies and controls to provide secure authentication.

  • Examine code to find and patch vulnerable components.

Programme Structure

Course structure:

  • Authentication and Authorization
  • Authentication Flaws in WebGoat
  • Authentication Bypass Exploit
  • Tips and Tricks for Burp Suite: Use Proxy to Intercept Traffic
  • Solution to Authentication Bypass: Evaluation of Code
  • Finding Vulnerabilities and Logical Flaws in Source Code

Key information

Duration

  • Part-time
    • 1 days

Start dates & application deadlines

You can apply for and start this programme anytime.

Language

English

Delivered

Online

Academic requirements

We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.

English requirements

We are not aware of any English requirements for this programme.

Tuition Fee

To always see correct tuition fees
  • International

    Free
    Tuition Fee
    Based on the tuition of 0 USD for the full programme during 1 days.
  • National

    Free
    Tuition Fee
    Based on the tuition of 0 USD for the full programme during 1 days.

You can choose from hundreds of free courses, or get a degree or certificate at a breakthrough price. You can now select Coursera Plus, an annual subscription that provides unlimited access.

Funding

Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project.

Other interesting programmes for you

Our partners

Exploiting and Securing Vulnerabilities in Java Applications
-
Coursera

Wishlist

Go to your profile page to get personalised recommendations!