• AUTHENTICATION
  • LESSON TITLE LEARNING OUTCOMES AUTHORIZATION
  • The school of progr amming and development n a n o d e g r e e s y L l a b u s




    Download 1.17 Mb.
    Pdf ko'rish
    bet7/9
    Sana02.03.2023
    Hajmi1.17 Mb.
    #43979
    1   2   3   4   5   6   7   8   9
    Bog'liq
    Udacity Enterprise Syllabus Full Stack Web Developer nd0044
    1667458021 (1), 1698295492
    LESSON TITLE
    LEARNING OUTCOMES
    FOUNDATIONS
    • 
    Describe and explain the use cases and differences between authorization 
    and authentication.
    • 
    Describe the problem of security and the risks of unsecured or improperly 
    secured application systems.
    • 
    Describe different types of security attack.
    • 
    Inspect requests and responses for an application using Postman.
    AUTHENTICATION
    • 
    Describe common methods for application authentication.
    • 
    Explain why passwords are not the ideal method for authentication.
    • 
    Implement an application authentication layer with Auth0.
    • 
    Secure API communications using JSON Web Tokens (JWT).
    PASSWORDS
    • 
    Describe the risks associated with password controlled systems.
    • 
    Mitigate access risks associated with SQL injection by validating and 
    sanitizing database inputs.
    • 
    Secure database data in a database using standard encryption practices.
    • 
    Describe how an attacker can use rainbow tables to gain access to a system.
    • 
    Improve security of hashed passwords and encrypted data using the ‘salt’ 
    method.
    • 
    Increase application security by using best practices to avoid logging and 
    serializing sensitive data.
    Course 3: Identity Access Management, cont.
    Nanodegree Program Overview


    12
    THE SCHOOL OF PROGRAMMING AND DEVELOPMENT
    LESSON TITLE
    LEARNING OUTCOMES
    AUTHORIZATION
    • 
    Describe the concept of authorization and access control.
    • 
    Define ‘permissions’ in the context of an application.
    • 
    Constrain permissions in an application by using role-based access control 
    (RBAC).
    • 
    Define permission roles using Auth0.
    • 
    Identify user permissions and roles from JWTs (JavaScript Web Tokens).

    Download 1.17 Mb.
    1   2   3   4   5   6   7   8   9




    Download 1.17 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    The school of progr amming and development n a n o d e g r e e s y L l a b u s

    Download 1.17 Mb.
    Pdf ko'rish