Exploiting and Securing Vulnerabilities in Java Applications



Exploiting and Securing Vulnerabilities in Java Applications

Exploiting and Securing Vulnerabilities in Java Applications


In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in …

Duration Course 1 of 4 in the
Start your Free Trial

Self paced

17,750 already enrolled

4.8stars Rating out of 5 (523 ratings in Coursera)

Go to the Course
We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.