Completed
USER INVITATION
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Building Data Breach and Subpoena Resistant Applications - Philly ETE 2017
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 BACKGROUND - TRADITIONAL DISCUSSION
- 3 BACKGROUND - PLAYING THE ODDS
- 4 BACKGROUND - RECENT EXAMPLES
- 5 NIGHTMARE THREATS
- 6 NIGHTMARE EXAMPLE
- 7 RISKS ASSOCIATED WITH ENCRYPTION
- 8 SOLUTION BLUEPRINT
- 9 JSON WEB TOKENS (JWT)
- 10 COST-BASED CRYPTOGRAPHIC HASHES
- 11 EXAMPLE APPLICATION - WRITTEN TEST ADMINISTRATION
- 12 ADMIN SETUP
- 13 USER INVITATION
- 14 USER LOGIN
- 15 USER STARTS EXERCISE
- 16 USER FINISHES EXERCISE
- 17 SUBMISSION REVIEWED
- 18 FINAL DATA FOOTPRINT
- 19 EPILOGUE
- 20 FURTHER READING/VIEWING
- 21 NEXT STEPS