Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

User Input Validation for Java Applications

Every security professional will tell you to never trust the client. This course will teach you what this means when validating untrusted input.

Josh Cummings - Pluralsight course - User Input Validation for Java Applications
Josh Cummings
What you'll learn

Postel’s law, insecure defaults, and even our human desire to be helpful and accommodating are all places where hackers can use unvalidated input to attack your system. In this course, User Input Validation for Java Applications, you’ll learn to validate untrusted user input. First, you’ll explore unbounded input. Next, you’ll discover the difference between allowlisting, blocklisting, and sanitation. Finally, you’ll learn how to safely deserialize data against a schema. When you’re finished with this course, you’ll have the skills and knowledge of secure coding needed to protect your system against malicious input.

Table of contents

About the author
Josh Cummings - Pluralsight course - User Input Validation for Java Applications
Josh Cummings

Like many software craftsmen, Josh eats, sleeps, and dreams in code. He codes for fun, and his kids code for fun! Right now, Josh works as a full-time committer on Spring Security and loves every minute.

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight