Showing 15577–15588 of 18767 results
Securing Docker Container Workloads
Docker containers are a mainstream mechanism for application delivery, and securing the container workload is vital. This course will give you the knowledge and techniques you need for securing containerized software applications.
Securing Express Applications
Learn how to defend against malicious attacks and improve user experiences using sessions, cookies, and password authentication.
Securing Express Applications
Learn how to defend against malicious attacks and improve user experiences using sessions, cookies, and password authentication.
Securing IIS Websites
In this course, you'll learn how to lock down your IIS server. You'll discover various methods of attack, how they work and how to prevent them. You'll learn how to monitor your server to prevent future attacks.
Securing Java microservices with Eclipse MicroProfile JSON Web Token (MicroProfile JWT)
Learn how to secure Java microservices using Eclipse MicroProfile JWT. Master the implementation of authentication and authorization protocols with JSON Web Tokens, ensuring secure access to your microservices and protecting sensitive data in cloud environments.
Securing Java Web Application Data
This course gives you the APIs and tools for securing user data in Java as well as the concepts needed to level up your data-security awareness.
Securing Java Web Applications
This course focuses on detection and mitigation of the input validation family of vulnerabilities, which can steal data, take control of servers, and cause havoc. You'll know how to be prepared to arm your application with the appropriate defense.
Securing Java Web Applications Through Authentication
Your users' usernames and passwords are the keys to the kingdom. Watch and apply this course in order to approach authenticating and managing secure data in Java web applications with greater confidence.
Securing Microservices in ASP.NET Core
This course will teach you how to secure your ASP.NET Core microservices using a variety of best practice patterns for authentication and authorization.
Securing Microsoft 365 Messaging Environments
Microsoft 365 has implemented three products that include security, protection, and compliance websites. This course will introduce you to all three systems so that you'll be able to create a functional and secure messaging system.
Securing Microsoft Azure Data Access Endpoints
This course provides detail on the technologies and options available to secure the endpoints of data services that are available in Azure.
Securing Microsoft Azure Networks
This course provides a fundamental understanding of Azure network security services, resources, and features to help you better secure your Azure environment. Along the way, you'll learn Microsoft's best practices and their role in your journey.