Search result for Authentication and security Online Courses & Certifications
Get Course Alerts by Email
Apache Kafka Security (SSL) Tutorial for Beginners
by Tutorial Drive- 3.3
1 hour on-demand video
Learn Security concepts like Encryption, Authentication, Authorization using SSL and enable security in Apache Kafka This course will explore the basic concepts of security like Encryption, Authentication, Authorization using SSL and enable security in Apache Kafka. Authentication of connections from producers and consumers using SSLAuthentication of connections from brokers to ZooKeeperEncryption of data between clients and servers using SSLAuthorization of sending / receiving permissions by clients...
$12.99
Configuring Linux Web Servers
by Michael Wales- 0.0
Approx. 1 weeks
In this course, you’ll explore a bare-bones linux system and how it differs from desktop environments you are currently familiar with. lesson 2 Linux Security Execute administrative tasks update the software on your system install new software and manage users. Learn how to implement even stronger authentication mechanisms and how to interpret Linux file permissions....
Free
Advanced System Security Topics
by Edward Chow , Greg Williams- 4.5
Approx. 15 hours to complete
In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path. Enhance Security with Network and Context Information Authentication and Role Based Access Control...
REST API Security-Basic Auth, JWT, OAuth 2.0, OIDC, MFA,HMAC
by Sanjay Bharatiya- 0.0
12 hours on-demand video
0, Open ID Connect (OIDC), MFA, HMAC, Okta, Spring Boot, Spring Security Securing REST APIs using Basic Authentication Securing REST APIs using JWT, Authentication and Authorization Gain lot of insights about Spring Boot security i. Spring security framework HMAC and how to implement it Understand what to choose and when from so many REST API security options...
$12.99
Identifying Security Vulnerabilities
by Sandra Escandor-O'Keefe- 4.6
Approx. 13 hours to complete
We'll also cover application authentication and session management where authentication is a major component of a secure web application and session management is the other side of the same coin, since the authenticated state of user requests need to be properly handled and run as one session. OWASP Proactive Controls Related to Session Management and Authentication...
Spring Security Core: Beginner to Guru
by John Thompson- 4.5
13 hours on-demand video
Learn how to use Spring Security to Secure Your Spring Framework Applications Application security is much more than allowing access after checking a user name and password. Spring Security has a very robust toolset for Authentication and Authorization. This allows us to explore the unique security aspects unique to both web applications and RESTFul APIs. HTTP Basic Authentication with Spring Security...
$12.99
Cybersecurity Compliance Framework & System Administration
by IBM Security Learning Services- 4.6
Approx. 16 hours to complete
This course gives you the background needed to understand the key cybersecurity compliance and industry standards. You will learn the concepts of endpoint security and patch management. National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls Active Directory Accounts and Security Considerations Kerberos Authentication and Logs...
Related searches
ASP.NET Core Identity and Security (SECOND EDITION)
by Aref K.- 4.6
4.5 hours on-demand video
NET Core applications and protect them against cyber attacks Enhance your application’s security and enable effective protection against malicious attacks. It is essential that software engineers learn these relevant skills and apply them when developing or updating security for their applications. A hands-on project to learn and practice: Cookie-based Authentication Role-based and Claims-based Authorization...
$15.99
Designing RESTful APIs
by Lorenzo Brown- 0.0
Approx. 3 weeks
A crucial skill for a back-end or full-stack web developer is the ability to make applications that are easily accessible and understood for other developers . Mobile developers, front-end developers and other back-end and full-stack developers all rely on API endpoints to enhance the functionality of their applications. How to add OAuth login and token-based authentication....
Free
Introduction to Cloud Identity
by Google Cloud Training- 4.6
Approx. 11 hours to complete
Introduction to Cloud Identity serves as the starting place for any new Cloud Identity, Identity/Access Management/Mobile Device Management admins as they begin their journey of managing and establishing security and access management best practices for their organization. • Explore and apply different security protocols to the domain. Exercise #3 - View and Manage your Users’ Security Settings...