Pluralsight – Microsoft Azure For Node Js Developers Building Secure Services And Applications

Pluralsight – Microsoft Azure For Node Js Developers Building Secure Services And Applications-QUASAR
English | Size: 464.18 MB
Category: Tutorial


Node.js is a very popular platform and is a first-class citizen in Azure This course shows you how to build various kinds of secure applications that integrate with Azure AD, and make use of Azure facilities such as managed identity and Key Vault. Node.js in Azure can be used in many ways: web apps, functions, containers, and more While writing these applications, you’ll want to offer authentication and authorization using Azure AD. You’ll want to give your applications identities using managed identity so they can access secure resources in a secure, monitored, and controlled manner. You’ll want your application to save secrets, secrets that are well guarded come with great monitoring, and more. In this course, Microsoft Azure for Node.js Developers – Building Secure Services and Applications you’ll learn how to write Node.js applications that can work in any form, and integrate and make use of all the facilities that Azure AD offers. You’ll also find out how Node.js applications can be given managed identities, and how such applications can safely use secrets guarded by Azure Key Vault. By the end of this course, you’ll have a good understanding of how to make use of the facilities Azure offers helping you write secure applications in Node.js [Read more…]

Linkedin Learning – CSSLP Cert Prep 2 Secure Software Requirements

Linkedin Learning – CSSLP Cert Prep 2 Secure Software Requirements-XQZT
English | Size: 154.01 MB
Category: Tutorial


Specific, achievable security requirements are critical ingredients in the creation of any application. In this course, the second installment in the CSSLP Cert Prep series instructor Jerod Brennen dives into the subject of security requirements to prepare you for the second domain of the Certified Secure Software Lifecycle Professional (CSSLP) exam: Secure Software Requirements. Jerod discusses how to properly define what an app must be and do in order to remain secure. He covers how to approach security, privacy, and data classification requirements for applications. Plus, he goes over how to validate your requirements, including how to use a security requirement traceability matrix (SRTM) to determine how well an app adheres to your security requirements [Read more…]

PluralSight – Secure Coding Preventing Sensitive Data Exposure

PluralSight – Secure Coding Preventing Sensitive Data Exposure-REBAR
English | Size: 122.69 MB
Category: Tutorial


Would you like the ability to recognize what is needed to make a web application properly manage sensitive data and prevent it from unintended exposure? This course, Secure Coding: Preventing Sensitive Data Exposure, will show you the knowledge that is based on the recommendations set by the Open Web Application Security Project (or OWASP in short). First, you will learn how to think of sensitive data and what constitutes sensitive data. Next, you will discover TLS; the protocol to protect sensitive data transmitted between a web browser and web application and the different facilities it provides to enable this protection. Finally, you will explore how to properly manage user passwords stored in a database. When you’re finished with this course, you will have the knowledge of preventing sensitive data exposure needed to effectively and efficiently apply them in your own Web applications. [Read more…]

PluralSight – Cisco Core Security Secure Network Access Using Cisco ISE

PluralSight – Cisco Core Security Secure Network Access Using Cisco ISE-REBAR
English | Size: 210.89 MB
Category: Tutorial


Only allowing authorized devices access to a network is challenging enough, but ensuring appropriate device access while still having operational efficiency is even harder. In this course, Cisco Core Security: Secure Network Access Using Cisco ISE, you’ll gain the ability to leverage Cisco ISE to implement 802.1X. First, you will learn the foundational information needed to understand 802.1X. Next, you will discover how to configure Cisco ISE to support your devices and apply the correct policy to them. Finally, you will explore how to configure Cisco switches to support 802.1X and MAB. When you are finished with this course, you will have the skills and knowledge of implementing 802.1X with Cisco ISE needed to ensure only authorized devices connect to your network. [Read more…]

Linux Academy – Secure Sockets Layer SSL Fundamentals

Linux Academy – Secure Sockets Layer SSL Fundamentals-BiFiSO
English | Size: 861.57 MB
Category: Tutorial

The backbone of securing network communications through encryption are Secure Sockets Layer (SSL) and its successor, Transport Layer Security (TLS). SSL and TLS are the standards widely used today to secure many communication types: websites, email, and many others. This course is designed to give you a high-level understanding of how to implement and maintain an environment that supports SSL and TLS. [Read more…]

Cisco – Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0

Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0
English | Size: 972.30 MB
Category: Tutorial

The Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 course teaches you how to implement, configure, monitor, and support enterprise VPN solutions. [Read more…]