Developing Secure Java Web Services, Java EE 6
Consultar precio
Infórmate sobre las condiciones
Solicita información
Developing Secure Java Web Services, Java EE 6
Solicita información
Información del curso
Curso
Distancia
Descripción
Course Objectives
Identify the need to secure web services
List and explain the primary elements and concepts of application security
Outline the factors that must be considered when designing a web service security solution
Describe the issues and concerns related to securing web service interactions
Analyze the security requirements of web services
Identify the security challenges and threats in a web service application
Evaluate the tools and technologies available for securing a Java(TM) web service
Secure web services by using application-layer security, transport-layer security, and message-layer security
Describe the concept of identity and the drivers behind identity management solutions
Explain the role of Sun Java System Access Manager in securing web services
Secure web services by using UserName token profile
Secure web services by relying on Sun Java System Access Manager
Identify the need to secure web services
List and explain the primary elements and concepts of application security
Outline the factors that must be considered when designing a web service security solution
Describe the issues and concerns related to securing web service interactions
Analyze the security requirements of web services
Identify the security challenges and threats in a web service application
Evaluate the tools and technologies available for securing a Java(TM) web service
Secure web services by using application-layer security, transport-layer security, and message-layer security
Describe the concept of identity and the drivers behind identity management solutions
Explain the role of Sun Java System Access Manager in securing web services
Secure web services by using UserName token profile
Secure web services by relying on Sun Java System Access Manager
Temario
Encapsulating the Basics of Security
- Summarize the characteristics of web services and analyze the impact on application security
- Examine how the data exposed by a web service can impact its security requirements
- Describe the security principles of web architecture
- Describe the characteristics of application security
- Describe the technologies used to implement application security
- Identify the security requirements of web services
- List the features that are typically provided by a properly implemented security mechanism
- List the security principles for web services
- Identify the security challenges and threats in a web service application
- Identify the technologies to address the security challenges in a web service application
- Identify methods to implement security in Java TM Platform, Enterprise Edition (JavaEE) applications
- Describe how to use Secure Sockets Layer (SSL) to secure a JavaEE web service application
- Outline the security mechanisms used by JavaEE web-tier applications
- Describe the JavaEE authentication service
- Describe how to secure web services by using application-layer and transport-layer security
Introduction to Web Services Securit
- Explain message-layer security and its advantages over transport-layer security
- Describe various web services security extension specifications and how they address web service security requirements
- Explain the WS-Policy specification
- Describe how to attach policy assertions to a Web Services Description Language (WSDL) file
- Describe the web services security technology in Metro
- Describe how to configure web services security by using Metro
- Understand and use the extension mechanism provided by JAX-WS Handlers to incorporate authentication support in a web service
- Understand and use the validation framework provided by WSIT to incorporate authentication support in a web service
- Manipulate SOAP structures directly using the SAAJ API
- Obtain and verify authentication information using the JAAS API
- Define identity and identity management
- Describe the need for identity management in enterprise applications
- Identify the technologies behind an identity management solution
- Describe the capabilities of OpenSSO
- Integrate OpenSSO in the deployment of web services
Destinatarios
Java Developer, Security Compliance Professionals, System Integrator
Developing Secure Java Web Services, Java EE 6
Itehl Consulting
Campus y sedes: Itehl Consulting
Itehl Consulting
(Distrito Federal)