Authorization

Sort options

Exploiting and Securing Vulnerabilities in Java Applications (Coursera)

In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even [...]
0
No votes yet

IT Security: Defense against the digital dark arts (Coursera)

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As [...]
7
Average: 7 ( 4 votes )

Seguridad informática: defensa contra las artes oscuras digitales (Coursera)

Este curso cubre una amplia variedad de conceptos, herramientas y mejores prácticas de seguridad de TI. Introduce amenazas y ataques, y las muchas formas en que pueden aparecer. Te daremos algunos antecedentes de algoritmos de cifrado y cómo se utilizan para salvaguardar los datos. Luego, nos sumergiremos en los [...]
0
No votes yet

Segurança de TI: defesa contra as artes negras digitais (Coursera)

Este curso abrange uma grande variedade de conceitos, ferramentas e práticas recomendadas ao nível da segurança de TI. Aborda ameaças e ataques e as várias formas através das quais podem surgir. Vamos fornecer-lhe algumas informações gerais sobre o que são os algoritmos de encriptação e como são utilizados para [...]
0
No votes yet

A300: Atlas Security (MongoDB)

Learn about the security features available in MongoDB Atlas. When creating applications, it is important that your users have trust that their data is safe. MongoDB Atlas has everything you need to ensure that your applications are compliant and secure. In this course, you will gain the skills necessary [...]
0
No votes yet

Authentication & Authorization: OAuth (Udacity)

Implementing Web Security with OAuth 2.0. As a Python programmer, leveraging Flask allows you to quickly and easily build your own web applications. But before you share your apps on the Internet you should protect your users' data, ensuring information stored on your site is safe from unwanted manipulation. [...]
0
No votes yet

Secure Passwords (Totem)

Pa$$word123, really? Follow your guide to good password management. By this point in the evolution of technology, most of us have a fairly large number of online accounts to keep track of, and to keep safe. It seems like we need multiple accounts for everything - email, messaging, social [...]
9
Average: 9 ( 1 vote )