Certified Secure Java Developer


Learn all about present security guidelines and considerations in Java Web Applications development.

In this comprehensive and extremely detailed course, you will learn the basics of application security and how to enforce security on a J2EE application. This course also teaches you all about enabling standard J2EE security mechanisms and more importantly it helps you understand why and how to implement security guidelines.

Benefits of choosing this course

Benefits of choosing the Certified Secure Java Developer course

Ideal course for Java developers and system architects looking to enhance their security skills.

Learn all about testing & resolving issues filed under OWASP Top 10.

Gain proficiency in enforcing J2EE security mechanisms.

Highlights of the Certified Secure Java Developer course

Hands-on training experience for those looking to enhance Java skills.

Heavily practical-focussed training with 10 lab sessions.

Creates improved understanding of languages & supported frameworks.

  • Key Learning Objectives
  • Downloads
  • About
  • Key Learning Objectives

      After completing the Certified Secure Java Developer course, you will be able to:
    • Understand the need for security and improve your familiarity with relevant security threats.
    • Design and develop secure J2EE applications.
    • Design & develop applications using ESAPI ( Enterprise Security API by OWASP).

    • Understand threat modelling objectives and tools, Threat Profiling, STRID Model, DREAD Model.
    • Evolve your knowledge about OWASP Top 10.
    • Develop an understanding of Security Frameworks including OWASP ESAPI Security, Spring Security and JSR 303 Validator.
    • Gain basic knowledge of Java-specific countermeasures.
    • Understand the need for Source Code Analysis and gain an understanding of languages and supported framework.
  • Direct Downloads

    Directly download the full Learning Objectives of the course here

    Templates. Worksheets & Mind-maps

    When you enrol in this course you will have access to several worksheets & templates that you can use immediately. Take a look at the course curriculum, below, to see whats included in this course.

    The image immediately below is a gallery view of some of the templates and collateral available to students.

    Continuing Professional Development

    CPD points can be claimed for this course at the rate of 1 point per hour of training for this NCSC-certified and CIISec-approved course (8 points for one-day public course and 15 points for the two-day internal workshop - for when organisations host this course internally).

    CIPR Student-Only Incident Response Plan Template

    As a student you get access to unique content including our highly acclaimed Cyber Incident Response Plan Template. If you want, you can download the FREE version of the Incident Response Plan template here.

  • About

Example Curriculum

  Section 1: Introduction
Available in days
days after you enroll
  Section 2: OWASP Introduction
Available in days
days after you enroll
  Section 3: OWASP Top 10
Available in days
days after you enroll
  Section 4: Beyond OWASP
Available in days
days after you enroll
  Section 5: Web Services
Available in days
days after you enroll
  Certified Secure Java Developer Quiz
Available in days
days after you enroll

Sign up and Start Today

Pay-in-full in your local currency (where available)

We take all major forms of payment and we use secure checkout.

Looking to bolster your organisation's readiness to handle cyber-attacks? Don't forget to check out our NCSC-Certified Cyber Incident Planning & Response course.