As a developer it is your responsibility to protect your users’ passwords and data, ensure the integrity of your data, and prevent your systems from being compromised. But where do you get started?
This course looks under the covers of a simple Java web application to demonstrate Java code that implements authentication and authorization, along with defensive measures based upon the OWASP Top 10 list of security vulnerabilities.
Along the way popular libraries will be explored including: * Apache Shiro * Bouncy Castle * Jasypt
By the end of this session you should understand how to get started with web security in Java, know what tools are available, and be aware of resources you can use for self-study.