Explore data integrity guidelines, how to enable accessibility and extensibility in Java applications, and how to handle input validation and mutability in this 14-video course examining Java Cryptography Architecture (JCA), Engine classes provided by JCA, Provider class capabilities, and other topics. To begin, discover how to prevent Denial-of-Service in Java applications; secure confidential information in Java applications; and examine guidelines for data integrity, focusing on injections, inclusion, and input validation. Recall how to facilitate accessibility and extensibility in Java applications and how to properly handle input validation and mutability. Explore how to secure sensitive objects, and secure serialization and deserialization in Java. You will describe JCA, including its architecture and the principles surrounding it. Delve into Provider Architecture and capabilities of the Provider class; describe the Engine class and list the Engine classes available in JCA; and learn about key pair generation in Java SE 11. You will also learn about signature management and how to generate and verify signatures using generated keys, and finally, convert unsecure socket code to secure socket code. This is one course is a series to prepare for the 1Z0-816: Java SE 11 Programmer II certification exam.
1Z0-816 - Java SE 11 Programmer II: Secure Coding in Java SE 11 Applications