Open Source Authentication: Security Without High Cost

Open Source Authentication: Security Without High Cost

OWASP Foundation via YouTube Direct link

Lin OTP

29 of 39

29 of 39

Lin OTP

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Open Source Authentication: Security Without High Cost

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why strong authentication
  3. 3 Companies in common
  4. 4 RSA hack
  5. 5 Market size
  6. 6 Breach statistics
  7. 7 Online fraud
  8. 8 Hackers everywhere
  9. 9 Breaches
  10. 10 Trends
  11. 11 Why now
  12. 12 Authentication methods
  13. 13 Issues faced by IT managers
  14. 14 What is Oath
  15. 15 Members of Oath
  16. 16 Algorithms
  17. 17 Roadmap
  18. 18 Certification Program
  19. 19 Review
  20. 20 Framework
  21. 21 Oath
  22. 22 Credential provisioning
  23. 23 Objectives
  24. 24 Certification
  25. 25 Typical Scenario
  26. 26 Framework Overview
  27. 27 Why OTP is still expensive
  28. 28 Why OTP should be a commodity
  29. 29 Lin OTP
  30. 30 Lin schematic
  31. 31 Authentication integration architecture
  32. 32 Thirdparty authentication
  33. 33 Adaptive Authentication
  34. 34 Biometrics
  35. 35 Behavioral Advantage
  36. 36 Security Technologies Fail
  37. 37 Behavioral Biometrics
  38. 38 We are changing
  39. 39 Is it creepy

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.