Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Udacity

Identity Access Management

via Udacity

Overview

In this part, you will build the backend for a coffee shop application. You’ll add user accounts and authentication to your application and use role-based access management strategies to control different types of user behavior in the app.

Syllabus

  • Foundation
    • Set the groundwork for understanding information security and refresh your understanding of the technologies used in future lessons.
  • Identity and Authentication
    • Explore frequently used methods of identifying who is making requests on web systems. Implement modern software patterns to accomplish this goal across the stack.
  • Passwords
    • Understand and overcome common pitfalls of the ubiquitous password authentication design pattern.
  • Access and Authorization
    • Limit access to specific resources or actions by restricting requests only to authorized request to particular users and groups of users. Implement role-based access controls (RBAC) across the stack.
  • Thinking Adversarially
    • Stay one step ahead of attackers by implementing a secure development process and knowing how to keep informed on the cutting edge of security research.
  • Project: Coffee Shop Full Stack
    • In this project, you'll demonstrate your new authentication and authorization skills by creating a full-stack application for a coffee shop menu.

Taught by

Gabriel Ruttner

Reviews

Start your review of Identity Access Management

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.