Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Securing Web Applications Using Spring Security

Course Summary

The Securing Web Applications Using Spring Security training course is designed to introduce the Spring Security framework.

The course begins by laying the foundations of the Spring Security framework. Next, it explores the practical use of the framework by examining Extensible Markup Language (XML) configuration for authentication and Uniform Resource Locator (URL)-based authorization. The course concludes with an exploration of Spring Security as a Java model, and advanced techniques.

Purpose
Learn how to secure a web application through the use of the Spring Security framework.
Audience
Java web developers looking to harden their application through the use of the Spring Security framework.
Role
Software Developer
Skill Level
Intermediate
Style
Workshops
Duration
2 Days
Related Technologies
Spring.io | Web Development | Cybersecurity

 

Productivity Objectives
  • Configure Spring Security for Hypertext Transfer Protocol (HTTP) Basic authentication
  • Construct and implement form-based authentication
  • Administer and configure common authentication strategies like "remember-me" and anonymous users
  • Design and implement an authorization strategy relating to Uniform Resource Locators (URLs)
  • Analyze application-specific user realms into Spring Security by implementing UserDetailsService

What You'll Learn:

In the Securing Web Applications Using Spring Security training course, you'll learn:
  • Review of general security terms and principles
  • Review of security model provided by Java and Jakarta EE
  • Review of Spring Framework and key components
  • Introduction to Spring Security
  • Capabilities of Spring Security and standards supported
  • Setting up Authentication with Spring Security
  • Implementing URL Authorization
  • Spring Security mechanics of Authentication and Authorization
  • Best Practices with Spring Security
“I appreciated the instructor's technique of writing live code examples rather than using fixed slide decks to present the material.”

VMware

Dive in and learn more

When transforming your workforce, it's important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.