Search result for Java vulnerabilities Online Courses & Certifications
Get Course Alerts by Email
Exploiting and Securing Vulnerabilities in Java Applications
by Joubin Jabbari- 4.6
Approx. 23 hours to complete
Finding Vulnerabilities and Logical Flaws in Source Code Solution: Fixing Vulnerabilities with XStream Form plans to mitigate injection vulnerabilities in your web application....
Hands-On Spring Security 5.x
by Packt Publishing- 3.5
1.5 hours on-demand video
By the end of the course, you’ll understand common security vulnerabilities and be able to prevent them with Spring Security, with an empirical approach to securing your web applications. Tomasz Lelek is a Software Engineer who programs mostly in Java and Scala. He has also written articles about everything related to the Java and Spring world...
$12.99
Java, JVM security. The Java sandbox model
by Ferenc Tollas- 3.9
2 hours on-demand video
As a Java professional, you must know what security features and settings the Java Virtual Machine provides. Java is used on by more than 80% of Desktops, on more than 100 million of TV devices, on few billions of mobile phone, so it is a good target to attack. Java was designed right from beginning to be secure....
$12.99
Software Security
by Michael Hicks- 4.6
Approx. 18 hours to complete
We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Format String Vulnerabilities...
Akka Serialization with Scala | Rock the JVM
by Daniel Ciocîrlan- 4.1
3.5 hours on-demand video
The Java serializer that comes by default is slow, uses a lot of memory and has security vulnerabilities. Any serious Akka development team should move away from Java serialization as soon as possible, and this course will show you how....
$10.99
The Complete Mobile Ethical Hacking Course
by Codestars by Rob Percival- 4.4
22 hours on-demand video
Java Fundamentals At the end of the course you will be able to understand the vulnerabilities in real world and learn how to fix them....
$16.99
Hands-on: Complete Penetration Testing and Ethical Hacking
by Muharrem AYDIN- 4.5
19.5 hours on-demand video
The third stage is the attack phase, when possible vulnerabilities discovered in the last stage are attacked with various hacking methods. They cannot work to discover vulnerabilities and then demand payment to fix them. An ethical hacker tries to locate vulnerabilities in the network by testing different hacking techniques on them....
$21.99
Related searches
The Complete Ethical Hacking Course
by Codestars by Rob Percival- 4.5
36 hours on-demand video
XSS Vulnerabilities You do not have to spend money on any other! I know Atil from Java & Kotlin courses and I follow him....
$19.99