kingers Posted March 23 Report Share Posted March 23 1.48 GB | 00:24:17 | mp4 | 1280X720 | 16:9Genre:eLearning |Language:EnglishFiles Included :01 course-introduction-introduction-to-security-and-authentication.mp4 (10.32 MB)02 instructor-introduction.mp4 (15.05 MB)04 the-whats-what-of-the-course.mp4 (18.09 MB)05 completing-the-guided-labs.mp4 (10.74 MB)08 introducing-the-ai-tool-microsoft-copilot.mp4 (17.67 MB)09 how-to-be-successful-in-this-program.mp4 (26.5 MB)10 introduction-to-the-project.mp4 (26.48 MB)01 introduction-securing-apis-with-asp-net-identity.mp4 (8.59 MB)02 overview-of-asp-net-identity.mp4 (29.14 MB)03 architecture-of-asp-net-identity.mp4 (21.75 MB)01 user-registration-process.mp4 (14.48 MB)03 user-authentication-process.mp4 (17.07 MB)04 implementing-user-registration-and-authentication.mp4 (8.17 MB)01 introduction-to-user-roles-in-asp-net-identity.mp4 (19.86 MB)03 claims-based-authorization-in-asp-net-identity.mp4 (28.47 MB)05 demonstrating-roles-and-claims-in-an-asp-net-application.mp4 (114.09 MB)06 managing-roles-and-claims-in-an-asp-net-application.mp4 (14.83 MB)01 overview-of-token-based-authentication.mp4 (29.98 MB)02 demonstrating-token-based-authentication-in-asp-net.mp4 (33.36 MB)03 implementing-token-based-authentication-in-an-asp-net-application.mp4 (14.58 MB)01 overview-of-external-authentication-providers.mp4 (23.78 MB)02 demonstrating-integration-of-external-providers.mp4 (41.25 MB)03 integrating-external-authentication-providers.mp4 (12.8 MB)06 conclusion-securing-apis-with-asp-net-identity.mp4 (7.8 MB)01 introduction-role-based-access-control-and-jwt-authentication.mp4 (11.52 MB)02 overview-of-role-based-access-control-rbac.mp4 (29.71 MB)01 what-are-json-web-tokens-jwts.mp4 (32.77 MB)03 creating-and-decoding-jwts.mp4 (18.46 MB)04 creating-and-decoding-jwts.mp4 (16.33 MB)01 overview-of-jwt-authentication-in-asp-net-core.mp4 (24.69 MB)02 implementing-jwt-authentication.mp4 (35.11 MB)03 implementing-jwt-authentication-in-asp-net.mp4 (13.07 MB)01 securing-api-endpoints-with-jwts.mp4 (24.67 MB)03 securing-api-endpoints-with-jwts.mp4 (26.02 MB)04 guided-lab-video-securing-api-endpoints-with-jwts.mp4 (10.15 MB)01 best-practices-for-jwt-authentication.mp4 (31.4 MB)02 implementing-security-best-practices-for-jwts.mp4 (67.4 MB)03 guided-lab-video-applying-jwt-security-best-practices.mp4 (13.52 MB)05 conclusion-role-based-access-control-and-jwt-authentication.mp4 (9.29 MB)01 introduction-data-protection.mp4 (10.7 MB)02 core-principles-of-data-protection.mp4 (26.95 MB)03 threats-to-data-protection.mp4 (24.75 MB)01 what-is-encryption.mp4 (31.23 MB)02 implementing-encryption-and-decryption.mp4 (33.04 MB)03 guided-lab-video-implementing-encryption-and-decryption.mp4 (12.47 MB)01 what-is-data-masking.mp4 (19.65 MB)02 what-is-data-obfuscation.mp4 (22.73 MB)01 best-practices-for-secure-data-storage.mp4 (17.29 MB)02 implementing-secure-data-storage.mp4 (51.8 MB)03 guided-lab-video-implementing-secure-data-storage.mp4 (22.25 MB)01 encryption-protocols-for-data-in-transit.mp4 (31.02 MB)02 methods-for-securing-network-data.mp4 (19.43 MB)04 conclusion-data-protection.mp4 (8.5 MB)01 introduction-using-microsoft-copilot-for-implementing-security-features.mp4 (9.5 MB)02 introduction-to-writing-secure-code.mp4 (24.55 MB)03 using-microsoft-copilot-to-write-secure-code.mp4 (46.33 MB)01 overview-of-authentication-and-authorization.mp4 (21.58 MB)02 implementing-authentication-and-authorization-with-microsoft-copilot.mp4 (57.02 MB)01 identifying-security-issues-in-code.mp4 (21.91 MB)02 using-microsoft-copilot-to-debug-security-issues.mp4 (62.44 MB)01 course-conclusion-security-and-authentication.mp4 (13.05 MB)]Screenshot https://rapidgator.net/file/804176adb0b3f3e74f27adde6aedb65b/Coursera.-.Security.and.Authentication.part1.rarhttps://rapidgator.net/file/4ad9e4e1ed700ad5504b94c4d8a58a1a/Coursera.-.Security.and.Authentication.part2.rar Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now