Coursera
Coursera Logo

University of California, Davis - Exploiting and Securing Vulnerabilities in Java Applications 

  • Offered byCoursera

Exploiting and Securing Vulnerabilities in Java Applications
 at 
Coursera 
Overview

Duration

23 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Exploiting and Securing Vulnerabilities in Java Applications
 at 
Coursera 
Highlights

  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Course 4 of 4 in the Secure Coding Practices Specialization
  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Intermediate Level
  • Approx. 23 hours to complete
  • English Subtitles: French, Portuguese (European), Russian, English, Spanish
Read more
Details Icon

Exploiting and Securing Vulnerabilities in Java Applications
 at 
Coursera 
Course details

More about this course
  • In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ?Admins?, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss various mitigation strategies. We do this by exploiting WebGoat, an OWASP project designed to teach penetration testing. WebGoat is a deliberately vulnerable application with many flaws and we take aim at fixing some of these issues. Finally we fix these issues in WebGoat and build our patched binaries. Together we will discuss online resources to help us along and find meaningful ways to give back to the larger Application Security community.
Read more

Exploiting and Securing Vulnerabilities in Java Applications
 at 
Coursera 
Curriculum

Setup and Introduction to Cross Site Scripting Attacks

Course Introduction

Overview of Resources and Tools for This Course

Setup and Introduction to Cross-site Scripting

Tips and Tricks to Use Git for Course and Project

How to Import WebGoat into IDE

How to Run WebGoat in a Docker Container

Injection Attacks: What They Are and How They Affect Us

Cross-site Scripting (XSS), Part 1

Protecting Against Cross-site Scripting (XSS), Part 2

Patching Reflected Cross-site Scripting (XSS), Part 3

Stored Cross-site Scripting (XSS)

Dangers of Cross-site Scripting (XSS) Attacks

A Note About Finding Lessons on WebGoat

Introduction to Labs (Peer Reviewed)

A Note From UC Davis

OWASP Cross Site Scripting Prevention Cheat Sheet

Note About Peer Review Assignments

Module 1 Quiz

Injection Attacks

Injection Attacks

Tutorial: Using a Proxy to Intercept Traffic from Client to Servers

SQL Syntax and Basics: Putting On the Attacker Hat

Solution to SQL Injection Attacks (SQLi)

SQL Injection Attacks: Evaluation of Code

XML External Entity (XXE) Attacks

Demo of an XML External Entity (XXE) Attack to Gain Remote Code Execution (RCE)

Evaluation of Code - XXE through a REST Framework

Solution: Evaluation of Code - XXE through a REST Framework

Patching the XXE Vulnerability

OWASP SQL Injection Prevention Cheat Sheet

OWASP XML External Entity Prevention Cheat Sheet

Module 2 Quiz

Authentication and Authorization

Authentication and Authorization

Introduction to Authentication Flaws in WebGoat

Authentication Bypass Exploit

Tips and Tricks for Burp Suite: Use Proxy to Intercept Traffic

Solution to Authentication Bypass: Evaluation of Code

Finding Vulnerabilities and Logical Flaws in Source Code

Introduction to JSON Web Tokens (JWT) and Authentication Bypass

Authentication Flaw JSON Web Tokens (JWT)

Solution Demo: Exploiting JSON Web Tokens (JWT)

Evaluating Code to Find the JSON Web Tokens (JWT) Flaw

Hint Video: (JWT) Patching the Vulnerable Code in WebGoat

Solution to Patch JWT Flaw

OWASP Transaction Authorization Cheat Sheet

A Beginner's Guide to JWTs in Java'

Module 3 Quiz

Dangers of Vulnerable Components and Final Project

Dangers of Vulnerable Components Introduction

Vulnerable Components (XStream Library)

Solution: Fixing Vulnerabilities with XStream

Introduction to Labs (Peer Reviewed)

Course Summary

Article: How Hackers Broke Equifax: Exploiting a Patchable Vulnerabil

Article: Exploiting OGNL Injection in Apache Struts

Note About Peer Review Assignments

Module 4 Practice Quiz

Exploiting and Securing Vulnerabilities in Java Applications
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Exploiting and Securing Vulnerabilities in Java Applications
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...