• Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

User Input Validation for Java Applications

Every security professional will tell you to never trust the client. This course will teach you what this means when validating untrusted input.

Josh Cummings - Pluralsight course - User Input Validation for Java Applications
by Josh Cummings

What you'll learn

Postel’s law, insecure defaults, and even our human desire to be helpful and accommodating are all places where hackers can use unvalidated input to attack your system. In this course, User Input Validation for Java Applications, you’ll learn to validate untrusted user input. First, you’ll explore unbounded input. Next, you’ll discover the difference between allowlisting, blocklisting, and sanitation. Finally, you’ll learn how to safely deserialize data against a schema. When you’re finished with this course, you’ll have the skills and knowledge of secure coding needed to protect your system against malicious input.

Table of contents

About the author

Josh Cummings - Pluralsight course - User Input Validation for Java Applications
Josh Cummings

Like many software craftsmen, Josh eats, sleeps, and dreams in code. He codes for fun, and his kids code for fun! Right now, Josh works as a full-time committer on Spring Security and loves every minute.

More Courses by Josh