Full Stack Python Security, Video Edition

Full Stack Python Security, Video Edition

Full Stack Python Security, Video Edition

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 8h 1m | 1.19 GB

Full Stack Python Security, Video Edition: No-nonsense techniques, libraries, and best practices you can use to keep your Python applications safe and secure.

In Full Stack Python Security, Video Edition: Cryptography, TLS, and attack resistance, you’ll learn how to:

  • Use algorithms to encrypt, hash, and digitally sign data
  • Create and install TLS certificates
  • Implement authentication, authorization, OAuth 2.0, and form validation in Django
  • Protect a web application with Content Security Policy
  • Implement Cross Origin Resource Sharing
  • Protect against common attacks including clickjacking, denial of service attacks, SQL injection, cross-site scripting, and more

Full Stack Python Security, Video Edition: Cryptography, TLS, and attack resistance teaches you everything you’ll need to build secure Python web applications. As you work through the insightful code snippets and engaging examples, you’ll put security standards, best practices, and more into action. Along the way, you’ll get exposure to important libraries and tools in the Python ecosystem.

Security is a full-stack concern, encompassing user interfaces, APIs, web servers, network infrastructure, and everything in between. Master the powerful libraries, frameworks, and tools in the Python ecosystem and you can protect your systems top to bottom. Packed with realistic examples, lucid illustrations, and working code, this video tutorial shows you exactly how to secure Python-based web applications.

Full Stack Python Security, Video Edition: Cryptography, TLS, and attack resistance teaches you everything you need to secure Python and Django-based web apps. In it, seasoned security pro Dennis Byrne demystifies complex security terms and algorithms. Starting with a clear review of cryptographic foundations, you’ll learn how to implement layers of defense, secure user authentication and third-party access, and protect your applications against common hacks.

1 2

Leave a Reply

Your email address will not be published. Required fields are marked *