Software Development
Showing 2293–2304 of 2824 results
Secure Software: Testing and Acceptance
This Free Online Course Includes: 1.5-3 Hours of Learning CPD Accreditation Final Assessment
Secure the Altair emulator
Learn how to help secure the Altair emulator network communications.
Secure your Azure virtual machine disks
Use Azure Disk Encryption (ADE) to encrypt OS and data disks on existing and new VMs.
Secure your cloud data
Azure was designed for security and compliance. Learn how to leverage the built-in services to store your app data securely to ensure that only authorized services and clients have access to it. This learning path can help you prepare for the Microsoft Certified: Azure Developer Associate certification.
Secure your hybrid and multicloud machines by using Azure Arc-enabled servers
Azure Arc promises to bridge the gap between on-premises and cloud environments. Azure Arc extends the consistent security, observability, and governance of the Azure platform to non-Azure machines. In this module, you'll learn about planning and securely deploying Azure Arc-enabled servers at scale.
Securing a Java web application using the Jakarta EE Security API
Explore how to secure Java web applications using the Jakarta EE Security API. Learn how to implement authentication, authorization, and security mechanisms in Java-based web applications, ensuring data protection and compliance with security standards.
Securing ASP.NET Core with OAuth2 and OpenID Connect
In this course you’ll learn how to secure your ASP.NET Core web applications and APIs with today’s de facto standards: OAuth2 and OpenID Connect.
Securing Java microservices with Eclipse MicroProfile JSON Web Token (MicroProfile JWT)
Learn how to secure Java microservices using Eclipse MicroProfile JWT. Master the implementation of authentication and authorization protocols with JSON Web Tokens, ensuring secure access to your microservices and protecting sensitive data in cloud environments.
Securing REST Services Using Spring Security 5
Learn the best practices to protect HTTP-based APIs using Spring Security. This course will teach you not only how to secure new Spring Boot applications that you are beginning to work on, but also how to add security to existing ones.
Securing the Pipeline with Open Source Tools
This talk digs into the fundamentals of DevSecOps, exploring the key principles required to advance your security practices.
Security Testing Basics
All the basics that are required for Beginners to get started with Security Testing are covered in this course
Select a Power BI embedded analytics product
Programmatic embedding of Power BI analytics always involves the selection and purchase of a product. The product can be Microsoft Power BI Premium or Microsoft Power BI Embedded. To make the right selection, you first need to determine whether the embedding scenario is for internal or external users.