Course

Exploiting and Securing Vulnerabilities in Java Applications

University of California, Davis

In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss various mitigation strategies. We do this by exploiting WebGoat, an OWASP project designed to teach penetration testing. WebGoat is a deliberately vulnerable application with many flaws and we take aim at fixing some of these issues. Finally we fix these issues in WebGoat and build our patched binaries. Together we will discuss online resources to help us along and find meaningful ways to give back to the larger Application Security community.

Certificate Available ✔

Get Started / More Info
Exploiting and Securing Vulnerabilities in Java Applications
More Computer Security and Networks Courses

Cybersecurity

University of Maryland, College Park

The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer...

Introduction to Computer Information Systems

University of California, Irvine

This Specialization is intended for anyone seeking to learn basic computer skills. Through 3 courses, you will study computer hardware, software, and data safety....

Block.one: Creating a Multi Node EOSIO Blockchain

Google Cloud

This is a self-paced lab that takes place in the Google Cloud console. In this lab, you will extend the single node EOSIO blockchain to use multiple nodes. You will...

Play It Safe: Manage Security Risks

Google

This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity...