Jump to content

Security and AuThentication


Recommended Posts

541637676_oip.jpg
1.48 GB | 00:24:17 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English



Files Included :
01 course-introduction-introduction-to-security-and-authentication.mp4 (10.32 MB)
02 instructor-introduction.mp4 (15.05 MB)
04 the-whats-what-of-the-course.mp4 (18.09 MB)
05 completing-the-guided-labs.mp4 (10.74 MB)
08 introducing-the-ai-tool-microsoft-copilot.mp4 (17.67 MB)
09 how-to-be-successful-in-this-program.mp4 (26.5 MB)
10 introduction-to-the-project.mp4 (26.48 MB)
01 introduction-securing-apis-with-asp-net-identity.mp4 (8.59 MB)
02 overview-of-asp-net-identity.mp4 (29.14 MB)
03 architecture-of-asp-net-identity.mp4 (21.75 MB)
01 user-registration-process.mp4 (14.48 MB)
03 user-authentication-process.mp4 (17.07 MB)
04 implementing-user-registration-and-authentication.mp4 (8.17 MB)
01 introduction-to-user-roles-in-asp-net-identity.mp4 (19.86 MB)
03 claims-based-authorization-in-asp-net-identity.mp4 (28.47 MB)
05 demonstrating-roles-and-claims-in-an-asp-net-application.mp4 (114.09 MB)
06 managing-roles-and-claims-in-an-asp-net-application.mp4 (14.83 MB)
01 overview-of-token-based-authentication.mp4 (29.98 MB)
02 demonstrating-token-based-authentication-in-asp-net.mp4 (33.36 MB)
03 implementing-token-based-authentication-in-an-asp-net-application.mp4 (14.58 MB)
01 overview-of-external-authentication-providers.mp4 (23.78 MB)
02 demonstrating-integration-of-external-providers.mp4 (41.25 MB)
03 integrating-external-authentication-providers.mp4 (12.8 MB)
06 conclusion-securing-apis-with-asp-net-identity.mp4 (7.8 MB)
01 introduction-role-based-access-control-and-jwt-authentication.mp4 (11.52 MB)
02 overview-of-role-based-access-control-rbac.mp4 (29.71 MB)
01 what-are-json-web-tokens-jwts.mp4 (32.77 MB)
03 creating-and-decoding-jwts.mp4 (18.46 MB)
04 creating-and-decoding-jwts.mp4 (16.33 MB)
01 overview-of-jwt-authentication-in-asp-net-core.mp4 (24.69 MB)
02 implementing-jwt-authentication.mp4 (35.11 MB)
03 implementing-jwt-authentication-in-asp-net.mp4 (13.07 MB)
01 securing-api-endpoints-with-jwts.mp4 (24.67 MB)
03 securing-api-endpoints-with-jwts.mp4 (26.02 MB)
04 guided-lab-video-securing-api-endpoints-with-jwts.mp4 (10.15 MB)
01 best-practices-for-jwt-authentication.mp4 (31.4 MB)
02 implementing-security-best-practices-for-jwts.mp4 (67.4 MB)
03 guided-lab-video-applying-jwt-security-best-practices.mp4 (13.52 MB)
05 conclusion-role-based-access-control-and-jwt-authentication.mp4 (9.29 MB)
01 introduction-data-protection.mp4 (10.7 MB)
02 core-principles-of-data-protection.mp4 (26.95 MB)
03 threats-to-data-protection.mp4 (24.75 MB)
01 what-is-encryption.mp4 (31.23 MB)
02 implementing-encryption-and-decryption.mp4 (33.04 MB)
03 guided-lab-video-implementing-encryption-and-decryption.mp4 (12.47 MB)
01 what-is-data-masking.mp4 (19.65 MB)
02 what-is-data-obfuscation.mp4 (22.73 MB)
01 best-practices-for-secure-data-storage.mp4 (17.29 MB)
02 implementing-secure-data-storage.mp4 (51.8 MB)
03 guided-lab-video-implementing-secure-data-storage.mp4 (22.25 MB)
01 encryption-protocols-for-data-in-transit.mp4 (31.02 MB)
02 methods-for-securing-network-data.mp4 (19.43 MB)
04 conclusion-data-protection.mp4 (8.5 MB)
01 introduction-using-microsoft-copilot-for-implementing-security-features.mp4 (9.5 MB)
02 introduction-to-writing-secure-code.mp4 (24.55 MB)
03 using-microsoft-copilot-to-write-secure-code.mp4 (46.33 MB)
01 overview-of-authentication-and-authorization.mp4 (21.58 MB)
02 implementing-authentication-and-authorization-with-microsoft-copilot.mp4 (57.02 MB)
01 identifying-security-issues-in-code.mp4 (21.91 MB)
02 using-microsoft-copilot-to-debug-security-issues.mp4 (62.44 MB)
01 course-conclusion-security-and-authentication.mp4 (13.05 MB)]
Screenshot
FGDP1RjQ_o.jpg
1LdiCrwX_o.jpg
kUYoxowv_o.jpg
7jDHILs8_o.jpg
1gvsb5Hq_o.jpg
LAxZBLlu_o.jpg
Vbj6zkQa_o.jpg
EGO5Q631_o.jpg
l3iZSHLb_o.jpg
VSRSc5Re_o.jpg
GNOWFzWb_o.jpg
XbWD3Fz0_o.jpg
H6gWuiWT_o.jpg
loCc0Yio_o.jpg
Db8MIXtf_o.jpg
ATS5UuJw_o.jpg
eRMvQwSd_o.jpg
Lzk5mgoe_o.jpg
L1Q5XD2h_o.jpg
X0viuxuO_o.jpg
Y9sBk9Oe_o.jpg
r2b6uCHi_o.jpg
zErIzE5v_o.jpg
SHv15Bl2_o.jpg
0iZOifsr_o.jpg
VUPhOKcb_o.jpg
0qWvfGVZ_o.jpg
cM4pMfil_o.jpg
EIbpGJRR_o.jpg
Y8X5tjoJ_o.jpg
hz3yL9c6_o.jpg
6cZaSiW4_o.jpg
u7PFKsGo_o.jpg
nRXJhcK8_o.jpg
2Yw4iYeo_o.jpg
hcXAUUY6_o.jpg
XmTBh9uZ_o.jpg
E1SIzYTn_o.jpg
GAQ3leNi_o.jpg






https://rapidgator.net/file/804176adb0b3f3e74f27adde6aedb65b/Coursera.-.Security.and.Authentication.part1.rar
https://rapidgator.net/file/4ad9e4e1ed700ad5504b94c4d8a58a1a/Coursera.-.Security.and.Authentication.part2.rar



Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...