Identity Access Management
Offered By: Udacity
Course Description
Overview
In this part, you will build the backend for a coffee shop application. You’ll add user accounts and authentication to your application and use role-based access management strategies to control different types of user behavior in the app.
Syllabus
- Foundation
- Set the groundwork for understanding information security and refresh your understanding of the technologies used in future lessons.
- Identity and Authentication
- Explore frequently used methods of identifying who is making requests on web systems. Implement modern software patterns to accomplish this goal across the stack.
- Passwords
- Understand and overcome common pitfalls of the ubiquitous password authentication design pattern.
- Access and Authorization
- Limit access to specific resources or actions by restricting requests only to authorized request to particular users and groups of users. Implement role-based access controls (RBAC) across the stack.
- Thinking Adversarially
- Stay one step ahead of attackers by implementing a secure development process and knowing how to keep informed on the cutting edge of security research.
- Project: Coffee Shop Full Stack
- In this project, you'll demonstrate your new authentication and authorization skills by creating a full-stack application for a coffee shop menu.
Taught by
Gabriel Ruttner
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network