Search result for Authorization and authentication Online Courses & Certifications
Get Course Alerts by Email
API Security on Google Cloud's Apigee API Platform
by Google Cloud Training- 4.6
Approx. 8 hours to complete
You learn about OAuth, the primary authorization method for REST APIs. Identity, Authentication, and Authorization OAuth Authorization Code Grant (1) OAuth Authorization Code Grant (2) OAuth Authorization Code Grant (3) JWT, JWS, SAML, and OpenID Connect Module Quiz - Authentication, Authorization and OAuth Module 2: Content, Transport, and Platform Security Reading: Apigee X and Apigee Edge differences...
Windows Server Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
At the end of Week 3, you will be able to differentiate between different authorization mechanisms and use different technologies to secure data within the environment. Users and authentication in a Windows environment Users and Authentication Users and authorization in a Windows environment Rights and Permissions Windows Authorization Manager Model Users and authorization...
Access Controls
by (ISC)² Education & Training- 4.7
Approx. 15 hours to complete
The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Authentication Mechanisms: Kerberos Applications and Process Authentication Mechanisms: Kerberos Considerations and Tools Authentication Mechanisms: Kerberos Applications and Process Authentication Mechanisms: Kerberos Considerations and Tools...
Securing and Integrating Components of your Application
by Google Cloud Training- 4.6
Approx. 15 hours to complete
In this course, application developers learn how to design and develop cloud-native applications that seamlessly integrate managed services from Google Cloud. Handling Authentication and Authorization Getting Started with Google Cloud Platform and Qwiklabs Lab: Adding User Authentication to your Application Handling Authentication and Authorization Quiz Writing, Deploying, and Monitoring Cloud Functions...
Hands-on authentication and authorization: OAuth
by Valentin Despa- 4.8
1.5 hours on-demand video
Learn about why OAuth is important and how to use it with APIs like: Dropbox, Flickr and many more. This course offers an introduction to API authorization using OAuth. This course shows you how to work with different real-world APIs and how to create requests from Postman....
$11.99
Fundamentals of Kubernetes Deployment
by Jim Sullivan- 4.3
Approx. 8 hours to complete
Over the next few weeks, you'll learn about several features of Kubernetes, the Kubernetes Architecture, how to create clusters, and different installation configurations. We will discuss clusters, pods, and nodes, and dive into Persistent Volumes as well as Kubernetes Authorization and Authentication. 2: Persistent Volumes, Authentication, and Authorization Authentication and Authorization...
Usable Security
by Jennifer Golbeck- 4.6
Approx. 12 hours to complete
This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system. Authorization and Communication Guidelines Usable Authentication and Passwords...
Related searches
Spring Security Master Class
by Mick Knutson- 5
13 hours on-demand video
Leverage JDBC for Authentication and Authorization Leverage Spring-Data JPA for Authentication and Authorization Leverage MongoDB and Spring-Data for Authentication and Authorization Section 7: Leveraging JDBC for Authentication and Authorization Section 8: Leveraging JPA for Authentication and Authorization Learn how to leverage various Authentication and Authorization features using Spring Security Learn how to implement Jdbc-based authentication and authorization...
$12.99
SQL Server 2014: Security Fundamentals
by Integrity Training- 4.1
3.5 hours on-demand video
This course will introduce students to SQL Server 2014 security fundamentals, as well as teach them about authentication, contained databases, authorization, permissions, schemas, metadata, and encryption. This course will teach students about SQL Server authentication, contained databases, authorization, permissions, schemas, execution and metadata. The final chapter of the course covers the theory and implementation of encryption....
$12.99
Application security on AWS with Amazon Cognito (June 2017)
by Mahmoud Matouk- 4.7
2 hours on-demand video
Amazon Cognito is a managed service from AWS that is used to add authentication and authorization features to web and mobile applications. In this course we will have a closer look at Amazon Cognito and understand the basics and what authentication and authorization features Cognito has to offer....
$12.99