Careers360 Logo
ask-icon
share
    Compare

    Quick Facts

    Medium Of InstructionsMode Of LearningMode Of Delivery
    EnglishSelf StudyVideo and Text Based

    Course Overview

    The Exploiting and Securing Vulnerabilities in Java Applications certification course is course number four of the Secure Coding Practices Specialization main course that is offered together with the efforts of the University of California, UC Davis, and provider, Coursera. This certificate course will help one learn instantly with flexible schedules and deadlines that help all the candidates. 

    The Exploiting and Securing Vulnerabilities in Java Applications training course will help the candidates with Java, and programming. During this programme’s course of study, the candidates will be taught to wear different kinds of hats like attacker hats, defender hats, and other hats so that vulnerabilities can be identified.

    The Highlights

    • Online course
    • Shareable certificate
    • 2 weeks for completion
    • English course title available 
    • Intermediate course level

    Programme Offerings

    • Flexible Deadlines
    • Short Programme
    • Different Subtitles.

    Courses and Certificate Fees

    Certificate AvailabilityCertificate Providing Authority
    yesUC DavisCoursera

    Exploiting and Securing Vulnerabilities in Java Applications Fee Details

    Description

    Total Fee in INR

    Course Fee, 1 month

    Rs. 1,699

    Course Fee, 3 months

    Rs. 3,499

    Course Fee, 6 months

    Rs. 5,199



    Eligibility Criteria

    Certification Qualifying Details

    • The Exploiting and Securing Vulnerabilities in Java Applications certification by Coursera is offered as soon as the programme ends.

    What you will learn

    JavaKnowledge of Cyber Security

    The Exploiting and Securing Vulnerabilities in Java Applications certification syllabus will teach the following:

    • Practicing ways to protect the different kinds of XSS which are cross-site scripting attacks.
    • Forming various plans that can help mitigate web application vulnerabilities.
    • Creating strategies along with controls that can help in secure authentication.
    • Examining the different codes that can help in finding the different vulnerable components. 

    Who it is for

    The Exploiting and Securing Vulnerabilities in Java Applications course will be ideal for people like Application Engineers, and  Application Developers.


    Admission Details

    To get admission to the Exploiting and Securing Vulnerabilities in Java Applications classes, the students can follow these steps: 

    Step 1: Follow the official URL: https://www.coursera.org/learn/exploiting-securing-vulnerabilities-java-applications

    Step 2: Then opt in by clicking the ‘Enroll Now’ button.

    Step 3: Finally signing into Coursera for the programme is the final step for beginning the learning process. 

    The Syllabus

    Videos
    • Course Introduction
    • Overview of Resources and Tools for This Course
    • Setup and Introduction to Cross-site Scripting
    • Tips and Tricks to Use Git for Course and Project
    • How to Import WebGoat into IDE
    • How to Run WebGoat in a Docker Container
    • Injection Attacks: What They Are and How They Affect Us
    • Cross-site Scripting (XSS), Part 1
    • Protecting Against Cross-site Scripting (XSS), Part 2
    • Patching Reflected Cross-site Scripting (XSS), Part 3
    • Stored Cross-site Scripting (XSS)
    • Dangers of Cross-site Scripting (XSS) Attacks
    • A Note About Finding Lessons on WebGoat
    • Introduction to Labs (Peer Reviewed)
    Readings
    • A Note From UC Davis
    • OWASP Cross Site Scripting Prevention Cheat Sheet
    • Note About Peer Review Assignments
    Quiz
    • Module 1 Quiz
    Peer Review
    • WebGoat Cross-Site Scripting (XSS)
    Discussion Prompts
    • Learning Goals
    • WebGoat Activity: Try It! Reflected XSS
    • WebGoat Activity: Try It! Reflected XSS (Again)
    • The Importance of Preventing Cross Site Scripting (XSS) Attacks
    • Cross Site Scripting (XSS) Lab Open Discussion Forum

    Videos
    • Injection Attacks
    • Tutorial: Using a Proxy to Intercept Traffic from Client to Servers
    • SQL Syntax and Basics: Putting On the Attacker Hat1
    • Solution to SQL Injection Attacks (SQLi)
    • SQL Injection Attacks: Evaluation of Code
    • XML External Entity (XXE) Attacks
    • Demo of an XML External Entity (XXE) Attack to Gain Remote Code Execution (RCE)
    • Evaluation of Code - XXE through a REST Framework
    • Solution: Evaluation of Code - XXE through a REST Framework
    • Patching the XXE Vulnerability
    Readings
    • OWASP SQL Injection Prevention Cheat Sheet
    • OWASP XML External Entity Prevention Cheat Sheet
    Quiz
    • Module 2 Quiz
    Peer Review
    • WebGoat SQL Injection
    Discussion Prompts
    • WebGoat Activity: Try It! String SQL Injection
    • WebGoat Activity: XXE (XML External Entity)
    • Injection Attacks Lab Open Discussion Forum

    Videos
    • Authentication and Authorization
    • Introduction to Authentication Flaws in WebGoat
    • Authentication Bypass Exploit
    • Tips and Tricks for Burp Suite: Use Proxy to Intercept Traffic
    • Solution to Authentication Bypass: Evaluation of Code
    • Finding Vulnerabilities and Logical Flaws in Source Code
    • Introduction to JSON Web Tokens (JWT) and Authentication Bypass
    • Authentication Flaw JSON Web Tokens (JWT)
    • Solution Demo: Exploiting JSON Web Tokens (JWT)
    • Evaluating Code to Find the JSON Web Tokens (JWT) Flaw
    • Hint Video: (JWT) Patching the Vulnerable Code in WebGoat
    • Solution to Patch JWT Flaw
    Readings
    • OWASP Transaction Authorization Cheat Sheet
    • A Beginner's Guide to JWTs in Java'
    Quiz
    • Module 3 Quiz
    Peer Review
    • WebGoat Authentication Flaws
    Discussion Prompts
    • WebGoat Activity: Authentication Bypasses
    • WebGoat Activity: JWT Tokens
    • Authentication Flaws Lab Open Discussion Forum

    Videos
    • Dangers of Vulnerable Components Introduction
    • Vulnerable Components (XStream Library)
    • Solution: Fixing Vulnerabilities with XStream
    • Introduction to Labs (Peer Reviewed)
    • Course Summary
    Readings
    • Article: How Hackers Broke Equifax: Exploiting a Patchable Vulnerabil10m
    • Article: Exploiting OGNL Injection in Apache Struts30m
    • Note About Peer Review Assignments
    Quiz
    • Module 4 Practice Quiz
    Peer Review
    • WebGoat Vulnerable Components
    Discussion Prompts
    • WebGoat Activity: Vulnerable Components
    • Self-Reflection

    Instructors

    UC Davis Frequently Asked Questions (FAQ's)

    1: The Exploiting and Securing Vulnerabilities in Java Applications online course is part of which main course?

    Secure Coding Practices Specialization is the name of the main course.

    2: Do we get any information on the age limit to get an enrolment?

    The enrolment does not have any particular age limit for the Exploiting and Securing Vulnerabilities in Java Applications certificate course.

    3: What’s the Exploiting and Securing Vulnerabilities in Java Applications online course level?

    The level is 100% intermediate as it requires some programming background.

    4: Name the tutors for this Exploiting and Securing Vulnerabilities in Java Applications course?

    Joubin Jabbari is the instructor.

    5: Does the syllabus contain any video?

    Yes, the syllabus has videos along with practice exercises for knowing how much one has learnt from the syllabus.

    Articles

    Student Community: Where Questions Find Answers

    Ask and get expert answers on exams, counselling, admissions, careers, and study options.