DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Career Course

REST API Security-BasicAuth-Authorization-JWT-OAuth-MFA-HMAC

Udemy

Reading Time: 2 mins read
in Course

Description
Why this course?
There are other courses and information available on internet which teach concepts in isolation. They basically do small POCs (Proof Of Concepts) to showcase various things. But they do not give you a project scenario and show how different things tie up together. This course is not a POC course. In this course we learn concepts by doing hands-on real time project, and code it ourselves. This will give a enhanced learning platform on top of the theoretical concepts which I have covered in great detail. I have taken a very easy to understand approach, and I will take you through a flow which will make learning each and every concept very interesting. I have taken a real world example and I keep on build on top of it in a continuous manner so that you do not loose the connectivity. You will learn about Spring Boot and Spring Security framework in lot of detail. We will dive deep into Spring Security Filters.

What you will learn?

In this course you will learn the following:

  • Basic concepts about REST API Security
  • Learn about TLS/SSL and know it works
  • How we can secure out API using HTTPS
  • Learn in detail about Basic Authentication
  • Secure our API using Basic Authentication with user detail in memory, file and database
  • Learn in detail about Authorization
  • Perform Authorization based on Roles and Authorities
  • Get a very good understanding of JWT
  • Secure our APIs using JWT. Perform Authentication and Authorization using JWT.
  • See how we can use JWT to secure our Micro Services
  • Learn about OAuth 2.0
  • See live example of OAuth 2.0, which we use in our daily lives
  • Get intorduced to Okta and use its various features
  • Use Okta to secure of APIs using OAuth 2.0
  • Learn about OIDC (Open ID Connect)
  • Examine the differences between OIDC and OAuth 2.0
  • Implement MFA (Multi Factor Authentication) for our APIs using Okta
  • Understand what is HMAC (Hash Message Authentication Code)
  • How to implement HMAC and secure our APIs using HMAC
  • Learn Spring Security in depth, exploring up to the filter level

Enroll Now

Tags: CoursesCyber securityMFA CoursesUdemy
ADVERTISEMENT

Related Posts

Cyber crime awareness training

Cyber crime awareness training

March 21, 2023
Cyber Crime and Cyber Security Training

Cyber Crime and Cyber Security Training

March 21, 2023
Cyber Enabled Crime – Course

Cyber Enabled Crime – Course

March 21, 2023
Forcepoint Email Security Administrator (Virtual) Course

Forcepoint Email Security Administrator (Virtual) Course

March 15, 2023

More Articles

Tool

Manage Engine EventLog Analyzer

May 19, 2022
Alerts

Potential phishing scam averted following Irish coronavirus certificate website typo

July 26, 2021

60 minutes: Ransomware (Season 51 | Episode 29)

March 22, 2021
Alerts

Microsoft Edge (Chromium-based) Security Advisory

November 1, 2021
Incidents

Credentials for thousands of open source projects free for the taking

June 13, 2022
Incidents

Tick targets East Asian DLP company

March 16, 2023
Document

Ethics of Hacktivism

April 22, 2022
Alerts

PingPull APT remote access tool

June 13, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.