11
EC-Council Certified Secure Programmer Java www.boosturskills.com

EC-Council Secure Programmer Java

Embed Size (px)

DESCRIPTION

B a Secure Programmer Today Get Certified, Get Recognized

Citation preview

Page 1: EC-Council Secure Programmer Java

EC-Council Certified Secure Programmer Javawww.boosturskills.com

Page 2: EC-Council Secure Programmer Java

www.boosturskills.com

Lets set up Framework

About EC-Council Secure Programmer Java

Course Objective.

What will you learn.

Prerequisite & Target Audience.

Exam structure..

Page 3: EC-Council Secure Programmer Java

www.boosturskills.com

EC-Council Certified Secure Programmer

This course will be invaluable to software developers and programmers alike to code and develop highly secure applications and web applications. This is done throughout the software life cycle that involves designing, implementing, and deployment of applications.

The course teaches developers how to identify security flaws and implement security countermeasures throughout the software development life cycle to improve the overall quality of products and applications.

Page 4: EC-Council Secure Programmer Java

www.boosturskills.com

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer lays the foundation required by all application developers and development organizations to produce applications with greater stability and fewer security risks to the consumer. The Certified Secure Application Developer standardizes the knowledge base for application development by incorporating the best practices followed by experienced experts in the various domains.

This course is purposefully built with tons of labs peppered throughout the three days of training, offering participants critical hands on time to fully grasp the new techniques and strategies in secure programming. 

Page 5: EC-Council Secure Programmer Java

www.boosturskills.com

Course Objective

This comprehensive course deep drives the reader on:• How Java security works.• Its security features.• Its security policies.• Its strengths, and weaknesses.

This course will help in understanding how best a programmer can write code to optimize application security.

This course will give basic to advanced knowledge in various aspects of secure Java development that can effectively prevent hostile and buggy code saving valuable effort, money, time and reputation of organizations as ‘prevention is always better than cure’.

Page 6: EC-Council Secure Programmer Java

www.boosturskills.com

What will you learn

1. Advanced knowledge of Java Security principles through advanced concepts and secured coding practices.

2. Core Java Security concepts such as Java Security Platform, Sandbox, JVM, Class loading, Bytecode verifier, Security Manager, security policies as well as Java Security Framework.

3. Secure Software Development, Threat modelling, Software Security Framework, Secure Software architectural design, coding, testing, review process techniques and practices.

4. Secure File Input/Output as well as secure coding in Serialization process, their best practices, standards and guidelines

Page 7: EC-Council Secure Programmer Java

www.boosturskills.com

What will you learn

5. Input validation in Java, its various techniques, input validation errors and best practices in implementing them.

6. Java’s fundamental concepts, the ‘Exceptions’; erroneous behaviour, best coding practices in avoiding and handling them.

7. Secure Authentication and Authorization .process implementation in Java applications, their various standard practices and guidelines.

8. Java Authentication and Authorization Service (JAAS), its architecture, Pluggable Authentication Module (PAM) Framework, access permissions through Java Security Model

Page 8: EC-Council Secure Programmer Java

www.boosturskills.com

What will you learn

9. Secure Java Concurrency and Session Management that includes Java Memory Model, Java Thread Implementation methods, secure coding practices, guidelines for handling threads, race conditions and deadlocks

10. Core security coding practices of Java Cryptography that includes Encryption, KeyGenerator, implementation of Cipher Class, Digital Signatures, Secret Keys and key management

11. Strengths and weaknesses of Java applications, various Java Application Vulnerabilities namely Cross-Site Scripting (XSS), Cross Site Request Forgery (CSRF), Directory Traversal vulnerability, HTTP Response Splitting attack, Parameter Manipulation, Injection Attacks their prevention techniques, secure coding best practices and countermeasures to avoid Java application vulnerabilities

Page 9: EC-Council Secure Programmer Java

www.boosturskills.com

Prerequisite & Target Audience

Prerequisite

You must be well-versed with JAVA programming language.

Target Audience

Students looking for their career in JAVA Programming

Programmers who are responsible for designing and building secure Windows/Web based applications with JAVA Framework. It is designed for developers who have JAVA development skills.

Page 10: EC-Council Secure Programmer Java

www.boosturskills.com

Exam Framework

Number of Questions: 50

Passing Score: 70%

Test Duration: 2 Hour

Test Format: Multiple Choice.

Test Delivery: Online.

Exam Prefix: 312-94

Page 11: EC-Council Secure Programmer Java

For More updates & Training calendar Contact/Registers with us @ info@boosturskills.

com Contact us @ Hotline : 18602121211

MOB: +91-9620189898

Landline: 080-25746500

Get Certified , Get Recognizedwww.boosturskills.com