[FTUForum.Com] [UDEMY] Angular 7 Security Masterclass (With FREE E-Book) [FTU]

Torrent Details


[FTUForum.com] [UDEMY] Angular 7 Security Masterclass (with FREE E-Book) [FTU]

NAME
[FTUForum.com] [UDEMY] Angular 7 Security Masterclass (with FREE E-Book) [FTU].torrent
CATEGORY
Other
INFOHASH
ad1268c2a059b8294d2d5865cb2c201e71354d08
SIZE
1.3 GB in 99 files
ADDED
Uploaded on 01-05-2019 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description





Practical Guide to Angular 6 Security - Add Authentication / Authorization (from scratch) to an Angular 6 / Node App



BESTSELLER



Created by: Angular University

Last updated: 3/2019

Language: English

Caption (CC): Included

Torrent Contains: 153 Files, 10 Folders

Course Source: https://www.udemy.com/angular-security/



What you'll learn



• Code in Github repository with downloadable ZIP files per section

• Get a solid foundation in Web Security Fundamentals

• Perform the attacks yourself manually, in order to fully understand them

• Understand and Defend an Application against common security attacks, such as Dictionary Attacks, Cross-Site Request Forgery, etc.

• Understand JWT in-depth, including the multiple signature types

• Design and Implement Application Authentication and Authorization from scratch

• Know how to add Authentication to an Angular Application using JWTs (and traditional Server Sessions)

• Know how to add RBAC (Role based Access control) Authorization to an Angular application



Requirements



• Just some previous knowledge of Angular and Typescript



Description



The course is an Web Application Security Fundamentals Course, where the application will use the Angular/Node stack.



This course covers Angular 6 and all the server code is in Typescript, but the security concepts explained in it are applicable to other technology stacks.



This course uses the Typescript language, and includes an auxiliary Ebook - The Typescript Jumpstart Ebook



We will use several MIT licensed Angular and Node packages from Auth0 (that you could use in your application), and we will also include a demo of how to use Auth0 for doing Application User Management.



Its important to realize that this is NOT an Auth0 specific course. Auth0 will be the source of a couple of open source packages we will use, and will be doing a quick demo of it to show how JWT makes it simple to delegate authentication to a third-party system, which could be developed in-house as well.



Security - A Fundamental Step in a Software Development Career



Security is probably the number one advanced topic that Software Developers are expected to master when going forward in their software development careers.



Security knowledge is hard to come by but its essential for advancing to more senior software development positions, like for example Application Architect or similar.



Learning Web Security Fundamentals, knowing how to design an application for security, and knowing how to recognize and fix security issues is an essential skill for a senior developer.



But the problem is that security knowledge is orthogonal to most other topics and it typically takes years to learn.



The good news is that once you have it, Security knowledge has a much longer shelf live than most software development knowledge in general.



Most of the vulnerabilities and fixes that you will learn in this course were useful 10 years ago, and will (very likely) still be useful 10 years from now - Angular and Node are just an example of one stack, to make the course examples more practical.



Security is seen as something really hard to master - this is actually not the case! Application Security is much more approachable than you might think, depending on how you learn it.



What Is The Best Way To Learn Security in a Fun and Practical Way?



Here is what we will do: we are going to take the skeleton of a running application that has no security yet, and we are going to secure the application step-by-step.



Using a couple of MIT packages from Auth0 (that you would be able to use in any project), we are going to implement the Sign-Up and Login functionality from scratch, and because security cannot be enforced only at the client-side, we will implement both the frontend in Angular and the backend in Node.



As we secure the application, and we are going to periodically attack the application many times during the course, to prove that the vulnerabilities are real!!



By doing so, we will learn along the way the fundamentals of Authentication and Authorization, we will become familiar with common vulnerabilities like Dictionary Attacks, CSRF and others, and we will get familiar with commonly used cryptographic tools like Hashing, Salting, JWT, password storage recommendations and more.



Please don't be intimidated by these concepts: The focus in this course will not be on the internals of each of the cryptographic tools that we will use, but instead on understanding on a high-level what problems do these tools solve, when to use each and why.



We will also learn how to design our application for security, and we will learn how in many situations application design is ou best defense.



Course Overview



We will start at the beginning: we will see the proper way of doing User Management and Sign Up: we will learn how to store passwords in a database, and we will introduce cryptographic hashes in an approachable way.



Once we have the Sign-Up functionality in place, we will implement Login and understand the need for a temporary identity token. Our first implementation will be stateful login, where the token is kept at the server level.



And at this point we could think we have authentication in place, but we decide to prepare our application for scalability, so we decide to try a JWT (JSON Web Tokens) based approach, because we know that this is what services like Firebase and Auth0 use.



We will use a couple of Auth0 packages to quickly refactor our Login to be JWT based, and learn the advantages of using JWT, and some potential disadvantages as well.



We will then see how its also possible to do Authentication using a third-party JWT-based service like Auth0, effectively removing all authentication logic from both our codebase and our database, and delegating it to a third-party service.



Note that this Auth0-specific part is only a small part of the course, and its main goal is to show how its possible at an enterprise level to delegate authentication to a centralized service, whithout having to introduce direct communication between applications and the centralized authentication service.



This means that if you can't use Auth0 at your company, you can apply the same design principles and design a JWT-solution that delegates authentication to a centralized server behind the firewall.



We will then cover how to do UI-level role-based functionality in Angular using the Angular Router, and a custom directive for showing or hiding certain parts of the UI depending on the role of the user. We will learn why the Router cannot enforce actual security.



We will also talk about server-side Authorization, and we will implement a commonly needed security-related Admin Level functionality: The Login As User service, that allows an admin to login as any user, to investigate a problem report. We can see why we would need to secure this functionality!



At the end of all these vulnerabilities and security fixes, we will have a well secured application and we will have learned a ton of security-related concepts along the way in a fun and practical way!



What Will you Learn In this Course?



With this course, you will have a rock-solid foundation on Web Application Security Fundamentals, and you will have gained the practical experience of applying those concepts by defending an application from a series of security attacks. You will have done so by actually performing many of the attacks!



You will have learned these concepts in the context of an Angular/Node application, but these concepts are applicable to any other technology stack.



You will learn what built-in mechanisms does Angular provide to defend against security problems, and what vulnerabilities it does NOT defend against and why.



You will be familiar with best practices for password storage, custom authentication service design and implementation, you will know the essentials about cryptographic hashes, be familiar with JWT and several commonly used open source Auth0 packages.



You will be familiar with the following security vulnerabilities: Dictionary attacks, identity token highjacking techniques, the browser same-origin policy, how to combine cookies with JWTs and why, Cross--Site Request Forgery or CSRF, common design vulnerabilities, and more.



You will know common practical solutions for securing both enterprise and public internet applications, such as how to use JWT to delegate authentication to a centralized service, which could be Auth0 or a in-house developed service that follows similar principles.



You will know how to implement UI-level authorization and use client-side constructs like Router guards to implement it and even build your own authorization-related UI directives.



You will also learn about server side authorization, and how to implement a commonly needed backend service that is only accessible to Admins - Login As User.



What Will You Be Able to do at the End Of This Course?



This course could help you take your development career to a more senior level, where the knowledge about web application security is essential and a key differentiating factor.



If you are a private internet business owner or thinking of launching your own platform, this course will contain most of what you need in practice to secure your own online platform in a robust and effective way.



With this course, you will have the knowledge necessary for evaluating many third-party security-related solutions, and you will know where to look for vulnerabilities in your application.



You will be able to understand most application-level vulnerability reports that come out of security audits done by third party companies, and you will be able to understand and fix the most commonly reported problems.



Who this course is for:



• Angular Developers looking to learn in-depth Web Application Security in the specific context of an Angular Application.



For More Udemy Free Courses >>> https://ftuforum.com/

For more Lynda and other Courses >>> https://www.freecoursesonline.me/

Our Forum for discussion >>> https://discuss.ftuforum.com/







Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
1. Introduction/1. Angular Security Course Helicopter View.mp421.2 MB
1. Introduction/1. Angular Security Course Helicopter View.vtt2.5 KB
1. Introduction/2. The Typescript Jumpstart Ebook.html6 KB
1. Introduction/2.1 Typescript_Jumpstart_Book_Udemy.pdf.pdf757.6 KB
1. Introduction/3. Installing Git, Node, NPM and Choosing an IDE.mp460.6 MB
1. Introduction/3. Installing Git, Node, NPM and Choosing an IDE.vtt5 KB
1. Introduction/4. Installing The Lessons Code - Learn Why Its Essential To Use NPM 5.mp414.8 MB
1. Introduction/4. Installing The Lessons Code - Learn Why Its Essential To Use NPM 5.vtt7 KB
1. Introduction/5. How To Run Node In TypeScript With Hot Reloading.mp48.1 MB
1. Introduction/5. How To Run Node In TypeScript With Hot Reloading.vtt71.9 MB
1. Introduction/6. Guided Tour Of The Sample Application.mp415 MB
1. Introduction/6. Guided Tour Of The Sample Application.vtt7.5 KB
10. Conclusion/1. Other Courses.mp430.4 MB
10. Conclusion/1. Other Courses.vtt2.9 KB
10. Conclusion/2. Bonus Lecture.html4.3 KB
10. Conclusion/3. Conclusion and Key Takeaways.mp483.4 MB
10. Conclusion/3. Conclusion and Key Takeaways.vtt10.4 KB
2. Sign Up Service - Initial Client and Server-Side Implementation/1. Client Side Authentication Service - API Design.mp411.2 MB
2. Sign Up Service - Initial Client and Server-Side Implementation/1. Client Side Authentication Service - API Design.vtt5.9 KB
2. Sign Up Service - Initial Client and Server-Side Implementation/2. Client Authentication Service - Design and Implementation.mp422.2 MB
2. Sign Up Service - Initial Client and Server-Side Implementation/2. Client Authentication Service - Design and Implementation.vtt11 KB
2. Sign Up Service - Initial Client and Server-Side Implementation/3. The New Angular HTTP Client - Doing a POST Call To The Server.mp414.8 MB
2. Sign Up Service - Initial Client and Server-Side Implementation/3. The New Angular HTTP Client - Doing a POST Call To The Server.vtt7.2 KB
2. Sign Up Service - Initial Client and Server-Side Implementation/4. User Sign Up Server-Side Implementation in Express.mp421.6 MB
2. Sign Up Service - Initial Client and Server-Side Implementation/4. User Sign Up Server-Side Implementation in Express.vtt10.8 KB
3. Password Storage - Hashing and Salting/1. Introduction To Cryptographic Hashes - A Running Demo.mp414.4 MB
3. Password Storage - Hashing and Salting/1. Introduction To Cryptographic Hashes - A Running Demo.vtt7 KB
3. Password Storage - Hashing and Salting/2. Some Interesting Properties Of Hashing Functions - Validating Passwords.mp413.2 MB
3. Password Storage - Hashing and Salting/2. Some Interesting Properties Of Hashing Functions - Validating Passwords.vtt7.6 KB
3. Password Storage - Hashing and Salting/3. Learn Offline Dictionary Attacks - Why Use Cryptographic Salting.mp417.7 MB
3. Password Storage - Hashing and Salting/3. Learn Offline Dictionary Attacks - Why Use Cryptographic Salting.vtt9.7 KB
3. Password Storage - Hashing and Salting/4. Password Key Derivation Functions and The Node Crypto Module.mp414.4 MB
3. Password Storage - Hashing and Salting/4. Password Key Derivation Functions and The Node Crypto Module.vtt6.7 KB
3. Password Storage - Hashing and Salting/5. Using the Argon 2 Hashing Function In Our Sign Up Backend Service.mp422.6 MB
3. Password Storage - Hashing and Salting/5. Using the Argon 2 Hashing Function In Our Sign Up Backend Service.vtt10.2 KB
3. Password Storage - Hashing and Salting/6. How To Implement a Password Policy.mp413.6 MB
3. Password Storage - Hashing and Salting/6. How To Implement a Password Policy.vtt6.2 KB
3. Password Storage - Hashing and Salting/7. Displaying Client-Side Password Validation Errors - What's Next.mp416.6 MB
3. Password Storage - Hashing and Salting/7. Displaying Client-Side Password Validation Errors - What's Next.vtt7.7 KB
4. User Session Management/1. Switch Branches And User Session Management Section Introduction.mp415.6 MB
4. User Session Management/1. Switch Branches And User Session Management Section Introduction.vtt8.8 KB
4. User Session Management/10. An Ancient Vulnerability - JSON Hijacking, Securing REST Endpoint.mp421.7 MB
4. User Session Management/10. An Ancient Vulnerability - JSON Hijacking, Securing REST Endpoint.vtt11.7 KB
4. User Session Management/11. Implementing Logout - Destroying The User Session.mp420.8 MB
4. User Session Management/11. Implementing Logout - Destroying The User Session.vtt9.7 KB
4. User Session Management/12. User Login - Step-by-Step Implementation.mp417.3 MB
4. User Session Management/12. User Login - Step-by-Step Implementation.vtt9 KB
4. User Session Management/13. Finish Login Functionality and Section Conclusion.mp424.8 MB
4. User Session Management/13. Finish Login Functionality and Section Conclusion.vtt12.3 KB
4. User Session Management/2. Node Util Promisify - How to Convert Callback Based APIs to Promise-based.mp410.9 MB
4. User Session Management/2. Node Util Promisify - How to Convert Callback Based APIs to Promise-based.vtt5.7 KB
4. User Session Management/3. Introduction To Node Async Await - Creating a User Session Id.mp418.6 MB
4. User Session Management/3. Introduction To Node Async Await - Creating a User Session Id.vtt9.9 KB
4. User Session Management/4. Modeling a User Session - Classes Or Interfaces.mp414.5 MB
4. User Session Management/4. Modeling a User Session - Classes Or Interfaces.vtt8.2 KB
4. User Session Management/5. Browser Cookies - How To Use Them For User Session Management.mp420.4 MB
4. User Session Management/5. Browser Cookies - How To Use Them For User Session Management.vtt9.9 KB
4. User Session Management/6. Attack Scenario - User Identity Theft Attack Using A Third-Party Server.mp412.2 MB
4. User Session Management/6. Attack Scenario - User Identity Theft Attack Using A Third-Party Server.vtt6.2 KB
4. User Session Management/7. How To Better Protect The Session Id Using HTTP Only Cookies.mp46.9 MB
4. User Session Management/7. How To Better Protect The Session Id Using HTTP Only Cookies.vtt3.3 KB
4. User Session Management/8. HTTPS Secure Cookies - Running the Angular CLI in HTTPS Mode.mp412.6 MB
4. User Session Management/8. HTTPS Secure Cookies - Running the Angular CLI in HTTPS Mode.vtt6.4 KB
4. User Session Management/9. Client-Side User Session Management - Retrieve User Data From Session.mp425.5 MB
4. User Session Management/9. Client-Side User Session Management - Retrieve User Data From Session.vtt12.6 KB
5. Introduction To JSON Web Tokens/1. JSON Web Tokens - Section Introduction.mp49.5 MB
5. Introduction To JSON Web Tokens/1. JSON Web Tokens - Section Introduction.vtt5.4 KB
5. Introduction To JSON Web Tokens/2. Creating Your First JWT - What Does It Look Like.mp44.8 MB
5. Introduction To JSON Web Tokens/2. Creating Your First JWT - What Does It Look Like.vtt2.7 KB
5. Introduction To JSON Web Tokens/3. JSON Web Tokens In a Nutshell.mp48.9 MB
5. Introduction To JSON Web Tokens/3. JSON Web Tokens In a Nutshell.vtt5.1 KB
5. Introduction To JSON Web Tokens/4. JSON Web Tokens In Detail - The Header and the Payload.mp418.7 MB
5. Introduction To JSON Web Tokens/4. JSON Web Tokens In Detail - The Header and the Payload.vtt8 KB
5. Introduction To JSON Web Tokens/5. JWT Signature With HS256 - How Does It Work Learn What is an HMAC Code.mp421.3 MB
5. Introduction To JSON Web Tokens/5. JWT Signature With HS256 - How Does It Work Learn What is an HMAC Code.vtt11.1 KB
5. Introduction To JSON Web Tokens/6. JWT Signature With RS256 - Learn The Advantages Compared to HS256.mp418.4 MB
5. Introduction To JSON Web Tokens/6. JWT Signature With RS256 - Learn The Advantages Compared to HS256.vtt10.1 KB
5. Introduction To JSON Web Tokens/7. Creating a JWT User Session - Setting Subject and Expiration.mp47.5 MB
5. Introduction To JSON Web Tokens/7. Creating a JWT User Session - Setting Subject and Expiration.vtt3.9 KB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/1. User Sign Up With JWT - Learn How To Combine Cookies and JWTs.mp420.6 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/1. User Sign Up With JWT - Learn How To Combine Cookies and JWTs.vtt10.2 KB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/2. Server-Side User Identification Via a Custom Express Middleware.mp421.7 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/2. Server-Side User Identification Via a Custom Express Middleware.vtt11.8 KB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/3. User Retrieval Express Middleware - Error Handling With Async Await.mp46.7 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/3. User Retrieval Express Middleware - Error Handling With Async Await.vtt4 KB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/4. Finishing The Implementation Of User Identification Middleware.mp413.5 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/4. Finishing The Implementation Of User Identification Middleware.vtt7.6 KB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/5. Backend JWT-based Security Using an Express Middleware.mp415.5 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/5. Backend JWT-based Security Using an Express Middleware.vtt8.6 KB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/6. JWT-based Authentication - Section Conclusion and What's Next.mp410.3 MB
6. JWT In Practice - Step-by-Step Authentication With JSON Web Tokens/6. JWT-based Authentication - Section Conclusion and What's Next.vtt5.4 KB
7. CSRF - Cross Site Request Forgery/1. Understanding CSRF - Step-by-Step Attack Simulation.mp423.9 MB
7. CSRF - Cross Site Request Forgery/1. Understanding CSRF - Step-by-Step Attack Simulation.vtt12.1 KB
7. CSRF - Cross Site Request Forgery/2. CSRF In Detail - Understanding Attack Limitations.mp418.2 MB
7. CSRF - Cross Site Request Forgery/2. CSRF In Detail - Understanding Attack Limitations.vtt9.2 KB
7. CSRF - Cross Site Request Forgery/3. Implementing the CSRF Double Submit Cookie Defense - Server Implementation.mp433.3 MB
7. CSRF - Cross Site Request Forgery/4. How To Defense Our Application Against CSRF - Client And Server Defenses.mp422 MB
7. CSRF - Cross Site Request Forgery/4. How To Defense Our Application Against CSRF - Client And Server Defenses.vtt11.7 KB
8. JWT-based Authentication With Auth0/10. Auth0 JWT-based Authentication - Backend Implementation.mp421.3 MB

Alternative Torrents for 'FTUForum.com UDEMY Angular Security Masterclass with FREE EBook FTU'.

There are no alternative torrents found.