SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

REST API Security-BasicAuth-Authorization-JWT-OAuth-MFA-HMAC

Udemy

2 min read
in Course, Learning

Description
Why this course?
There are other courses and information available on internet which teach concepts in isolation. They basically do small POCs (Proof Of Concepts) to showcase various things. But they do not give you a project scenario and show how different things tie up together. This course is not a POC course. In this course we learn concepts by doing hands-on real time project, and code it ourselves. This will give a enhanced learning platform on top of the theoretical concepts which I have covered in great detail. I have taken a very easy to understand approach, and I will take you through a flow which will make learning each and every concept very interesting. I have taken a real world example and I keep on build on top of it in a continuous manner so that you do not loose the connectivity. You will learn about Spring Boot and Spring Security framework in lot of detail. We will dive deep into Spring Security Filters.

What you will learn?

In this course you will learn the following:

  • Basic concepts about REST API Security
  • Learn about TLS/SSL and know it works
  • How we can secure out API using HTTPS
  • Learn in detail about Basic Authentication
  • Secure our API using Basic Authentication with user detail in memory, file and database
  • Learn in detail about Authorization
  • Perform Authorization based on Roles and Authorities
  • Get a very good understanding of JWT
  • Secure our APIs using JWT. Perform Authentication and Authorization using JWT.
  • See how we can use JWT to secure our Micro Services
  • Learn about OAuth 2.0
  • See live example of OAuth 2.0, which we use in our daily lives
  • Get intorduced to Okta and use its various features
  • Use Okta to secure of APIs using OAuth 2.0
  • Learn about OIDC (Open ID Connect)
  • Examine the differences between OIDC and OAuth 2.0
  • Implement MFA (Multi Factor Authentication) for our APIs using Okta
  • Understand what is HMAC (Hash Message Authentication Code)
  • How to implement HMAC and secure our APIs using HMAC
  • Learn Spring Security in depth, exploring up to the filter level

Enroll Now

Related

Tags: CoursesCyber securityMFA CoursesREST API Security-BasicAuth-Authorization-JWT-OAuth-MFA-HMACUdemy
1
VIEWS
ADVERTISEMENT

Related Posts

Cyberterrorism A Complete Guide

Cyberterrorism A Complete Guide

May 9, 2022
Cyber Crime and Cyber Terrorism Investigator’s Handbook

Cyber Crime and Cyber Terrorism Investigator’s Handbook

May 9, 2022
Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities

Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities

May 9, 2022
Cyberterrorism (Current Controversies)

Cyberterrorism (Current Controversies)

May 9, 2022

More Articles

Alerts

Adobe Releases Security Updates

April 15, 2021
Alerts

SAP security advisory (AV22-267)

May 11, 2022
Cyber101

Cryptographic key component – Definition

April 15, 2022

DNS: Domain name server

October 23, 2020

Proof of work consensus model

February 27, 2021
Document

COMMISSION STAFF WORKING DOCUMENT Accompanying the document COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Data protection rules as a pillar of citizens empowerment and EUs approach to digital transition.

March 23, 2022

Sealioning

November 17, 2021

Hack for Fun and Profit

April 20, 2022
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials
  • Cyber Opportunities

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....