Showing 3529–3540 of 4482 results

Securing IIS Websites
In this course, you'll learn how to lock down your IIS server. You'll discover various methods of attack, how they work and how to prevent them. You'll learn how to monitor your server to prevent future attacks.

Securing Java microservices with Eclipse MicroProfile JSON Web Token (MicroProfile JWT)
Learn how to secure Java microservices using Eclipse MicroProfile JWT. Master the implementation of authentication and authorization protocols with JSON Web Tokens, ensuring secure access to your microservices and protecting sensitive data in cloud environments.

Securing Java Web Application Data
This course gives you the APIs and tools for securing user data in Java as well as the concepts needed to level up your data-security awareness.

Securing Java Web Applications
This course focuses on detection and mitigation of the input validation family of vulnerabilities, which can steal data, take control of servers, and cause havoc. You'll know how to be prepared to arm your application with the appropriate defense.

Securing Java Web Applications Through Authentication
Your users' usernames and passwords are the keys to the kingdom. Watch and apply this course in order to approach authenticating and managing secure data in Java web applications with greater confidence.

Securing Microsoft 365 Messaging Environments
Microsoft 365 has implemented three products that include security, protection, and compliance websites. This course will introduce you to all three systems so that you'll be able to create a functional and secure messaging system.

Securing Network Communication with Cisco VPNs
Once an organization has selected the right VPN for their needs, someone will need to add the VPN configuration to the router and this is where you come in, however, it's also important to know how it's done and this is where this course comes in.

Securing React 16 Apps with Auth0
This course will teach you how to handle authorization and authentication in your React app. Implement login, signup, and secure API calls using modern security protocols including OAuth 2.0, OpenID Connect, and JWT tokens.

Securing REST API for Web Applications and Services
Secure your win in the REST API interview. The gist of years of experience on how to effectively secure your REST APIs and prevent attacks is in this course.

Securing REST Services Using Spring Security 5
Learn the best practices to protect HTTP-based APIs using Spring Security. This course will teach you not only how to secure new Spring Boot applications that you are beginning to work on, but also how to add security to existing ones.

Securing the Pipeline with Open Source Tools
This talk digs into the fundamentals of DevSecOps, exploring the key principles required to advance your security practices.

Securing the Switch
This course will describe some of the most severe switch security risks and discuss the mechanisms to help mitigate attacks through the well-known vectors.