Lorsque vous vous inscrivez à ce cours, vous êtes également inscrit(e) à cette Spécialisation.
Apprenez de nouveaux concepts auprès d'experts du secteur
Acquérez une compréhension de base d'un sujet ou d'un outil
Développez des compétences professionnelles avec des projets pratiques
Obtenez un certificat professionnel partageable
Il y a 4 modules dans ce cours
This course explores security and authentication in back-end development focusing on ASP.NET Identity, role-based access, and data protection. You’ll learn how to securely manage user authentication, authorization, and encryption, while using Microsoft Copilot to write safe code and protect your APIs.
By the end of the course, you will be able to…
Describe the features and functionalities of ASP.NET Identity, role-based access control, and data protection principles
Explain the processes of user registration, token-based authentication, encryption and decryption, and securing API endpoints
Define the importance of role-based access control, the structure and use of JSON Web Tokens (JWT), and best practices for secure data storage
Develop a secure back-end application using Microsoft Copilot, including writing secure code, implementing authentication and authorization, and resolving security issues
This module begins with course orientation before diving into the core features and functionalities of ASP.NET Identity for securing APIs. You'll learn how to implement user registration, authentication, and role management, as well as manage claims for fine-grained access control. The module also covers token-based authentication and integrating external authentication providers. By the end, you'll be equipped to secure APIs effectively using ASP.NET Identity.
Inclus
23 vidéos15 lectures7 devoirs4 laboratoires non notés4 plugins
Afficher les informations sur le contenu du module
23 vidéos•Total 110 minutes
Course Introduction: Introduction to Security and Authentication•2 minutes
The What’s What of the Course•3 minutes
Completing the Guided Labs•4 minutes
Introducing the AI Tool: Microsoft Copilot•3 minutes
How to be Successful in This Program•5 minutes
Introduction to the Project•4 minutes
Introduction: Securing APIs with ASP.NET Identity•1 minute
Overview of ASP.NET Identity•5 minutes
Architecture of ASP.NET Identity•4 minutes
User Registration Process•3 minutes
User Authentication Process•3 minutes
Implementing User Registration and Authentication•2 minutes
Introduction to User Roles in ASP.NET Identity•4 minutes
Claims-Based Authorization in ASP.NET Identity•5 minutes
Demonstrating Roles and Claims in an ASP.NET Application•24 minutes
Managing Roles and Claims in an ASP.NET Application•4 minutes
Overview of Token-Based Authentication•5 minutes
Demonstrating Token-Based Authentication in ASP.NET•7 minutes
Implementing Token-Based Authentication in an ASP.NET Application•4 minutes
Overview of External Authentication Providers•4 minutes
Demonstrating Integration of External Providers•10 minutes
In this module, you will learn the fundamentals of role-based access control (RBAC) and JSON Web Tokens (JWT) for securing APIs. You’ll explore the structure and usage of JWT, steps to implement JWT authentication in ASP.NET Core, and methods to secure API endpoints. The module also covers best practices to ensure robust and secure JWT authentication. By the end, you’ll be ready to implement and manage secure API access using RBAC and JWT.
Inclus
15 vidéos11 lectures9 devoirs4 laboratoires non notés4 plugins
Afficher les informations sur le contenu du module
15 vidéos•Total 77 minutes
Introduction: Role-Based Access Control and JWT Authentication•2 minutes
Overview of Role-Based Access Control (RBAC)•5 minutes
What are JSON Web Tokens (JWTs)?•5 minutes
Creating and Decoding JWTs•6 minutes
Guided Lab:Creating and Decoding JWTs•4 minutes
Overview of JWT Authentication in ASP.NET Core•4 minutes
Implementing JWT Authentication•8 minutes
Guided lab: Implementing JWT Authentication in ASP.NET•3 minutes
Securing API Endpoints with JWTs•3 minutes
Securing API Endpoints with JWTs•7 minutes
Guided Lab Video: Securing API Endpoints with JWTs•3 minutes
Best Practices for JWT Authentication•5 minutes
Implementing Security Best Practices for JWTs•16 minutes
Guided Lab Video: Applying JWT Security Best Practices•4 minutes
Conclusion: Role-Based Access Control and JWT Authentication•1 minute
11 lectures•Total 150 minutes
Activity: Architecture of RBAC in ASP.NET Core - Answer Key•10 minutes
Understanding Role-Based Access Control (RBAC)•10 minutes
Activity: JWT Structure - Answer Key•30 minutes
You Try It! Creating and Decoding JWTs - Answer Key•10 minutes
Creating and Using JSON Web Tokens (JWT) in ASP.NET Core•10 minutes
You Try It! Implementing JWT Authentication in ASP.NET - Answer Key•10 minutes
Step-by-Step Guide to Implementing JWT Authentication in ASP.NET Core•10 minutes
Activity: Plan Security for API Endpoints- Answer Key•30 minutes
You Try It! Securing API Endpoints with JWTs - Answer Key•10 minutes
Securing API Endpoints with JWTs•10 minutes
You Try It! Applying JWT Security Best Practices - Answer Key•10 minutes
9 devoirs•Total 255 minutes
Activity: Architecture of RBAC in ASP.NET Core•30 minutes
Practice Quiz: Introduction to Role-Based Access Control•20 minutes
Activity: JWT Structure•30 minutes
Practice Quiz: Introduction to JSON Web Tokens (JWT)•25 minutes
Practice Quiz: Implementing JWT Authentication in ASP.NET Core•20 minutes
Activity: Plan Security for API Endpoints•30 minutes
Practice Quiz: Securing API Endpoints with JWTs•30 minutes
Practice Quiz: Best Practices for Implementing JWT Authentication•20 minutes
Graded Quiz: Role-Based Access Control and JWT Authentication•50 minutes
4 laboratoires non notés•Total 240 minutes
You Try It! Creating and Decoding JWTs•60 minutes
You Try It! Implementing JWT Authentication in ASP.NET•60 minutes
You Try It! Securing API Endpoints with JWTs•60 minutes
You Try It! Applying JWT Security Best Practices•60 minutes
4 plugins•Total 60 minutes
Guided Lab: Creating and Decoding JWTs•15 minutes
Guided Lab: Implementing JWT Authentication in ASP.NET•15 minutes
Guided Lab: Securing API Endpoints with JWTs•15 minutes
Guided Lab: Applying JWT Security Best Practices•15 minutes
Data Protection
Module 3•9 heures à terminer
Détails du module
This module explores the fundamental principles of data protection and secure data management. You’ll learn about encryption, decryption, and techniques like data masking and obfuscation. The module also covers best practices for secure data storage and methods for protecting data in transit. By the end, you’ll understand how to safeguard sensitive information effectively across various contexts.
Inclus
14 vidéos7 lectures8 devoirs2 laboratoires non notés2 plugins
Afficher les informations sur le contenu du module
14 vidéos•Total 61 minutes
Introduction: Data Protection•1 minute
Core Principles of Data Protection•4 minutes
Threats to Data Protection•4 minutes
What is Encryption?•5 minutes
Implementing Encryption and Decryption•7 minutes
Guided Lab Video: Implementing Encryption and Decryption•3 minutes
What is Data Masking?•3 minutes
What is Data Obfuscation?•4 minutes
Best Practices for Secure Data Storage•3 minutes
Implementing Secure Data Storage•11 minutes
Guided Lab Video: Implementing Secure Data Storage•6 minutes
Encryption Protocols for Data in Transit•5 minutes
Methods for Securing Network Data•3 minutes
Conclusion: Data Protection•1 minute
7 lectures•Total 110 minutes
Understanding the Core Principles of Data Protection•10 minutes
You Try It! Implementing Encryption and Decryption - Answer Key•10 minutes
Encryption and Decryption: Best Practices and Key Differences•10 minutes
Understanding Data Masking and Obfuscation•30 minutes
You Try It! Implementing Secure Data Storage - Answer Key•10 minutes
Secure Data Storage: Best Practices and Techniques•30 minutes
Protecting Data in Transit: Encryption Protocols and Best Practices•10 minutes
8 devoirs•Total 225 minutes
Activity: Data Breaches•30 minutes
Practice Quiz: Introduction to Data Protection•20 minutes
Practice Quiz: Encryption and Decryption•25 minutes
Activity: Data Masking and Obfuscation•30 minutes
Practice Quiz: Data Masking and Obfuscation•25 minutes
Practice Quiz: Secure Data Storage•25 minutes
Practice Quiz: Protecting Data in Transit•20 minutes
Graded Quiz: Data Protection•50 minutes
2 laboratoires non notés•Total 120 minutes
You Try It! Implementing Encryption and Decryption•60 minutes
You Try It! Implementing Secure Data Storage•60 minutes
2 plugins•Total 30 minutes
Guided Lab: Implementing Encryption and Decryption•15 minutes
Guided Lab: Implementing Secure Data Storage•15 minutes
Using Microsoft Copilot for Implementing Security Features
Module 4•4 heures à terminer
Détails du module
In this module, you will learn how to leverage Microsoft Copilot to enhance application security. You’ll explore how to write secure code, implement authentication and authorization, and debug security issues with Copilot’s intelligent assistance. By the end, you’ll be equipped to integrate Copilot into your security workflows to build and maintain secure applications efficiently.
Inclus
8 vidéos3 lectures3 devoirs1 évaluation par les pairs
Afficher les informations sur le contenu du module
8 vidéos•Total 52 minutes
Introduction: Using Microsoft Copilot for Implementing Security Features•1 minute
Introduction to Writing Secure Code•4 minutes
Using Microsoft Copilot to Write Secure Code•11 minutes
Overview of Authentication and Authorization•4 minutes
Implementing Authentication and Authorization with Microsoft Copilot•13 minutes
Identifying Security Issues in Code•3 minutes
Using Microsoft Copilot to Debug Security Issues•14 minutes
Course Conclusion: Security and Authentication•2 minutes
3 lectures•Total 30 minutes
Secure Coding Best Practices: A Guide with Microsoft Copilot•10 minutes
Implementing Authentication and Authorization with Microsoft Copilot•10 minutes
Debugging and Resolving Security Issues with Microsoft Copilot•10 minutes
3 devoirs•Total 90 minutes
Activity: Writing Secure Code Using Microsoft Copilot•30 minutes
Activity: Implementing Authentication and Authorization Using Microsoft Copilot•30 minutes
Activity: Debugging and Resolving Security Issues Using Microsoft Copilot•30 minutes
1 évaluation par les pairs•Total 60 minutes
Capstone Project Overview and Requirements•60 minutes
Obtenez un certificat professionnel
Ajoutez ce titre à votre profil LinkedIn, à votre curriculum vitae ou à votre CV. Partagez-le sur les médias sociaux et dans votre évaluation des performances.
Our goal at Microsoft is to empower every individual and organization on the planet to achieve more.
In this next revolution of digital transformation, growth is being driven by technology. Our integrated cloud approach creates an unmatched platform for digital transformation. We address the real-world needs of customers by seamlessly integrating Microsoft 365, Dynamics 365, LinkedIn, GitHub, Microsoft Power Platform, and Azure to unlock business value for every organization—from large enterprises to family-run businesses. The backbone and foundation of this is Azure.
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?
Felipe M.
Étudiant(e) depuis 2018
’Pouvoir suivre des cours à mon rythme à été une expérience extraordinaire. Je peux apprendre chaque fois que mon emploi du temps me le permet et en fonction de mon humeur.’
Jennifer J.
Étudiant(e) depuis 2020
’J'ai directement appliqué les concepts et les compétences que j'ai appris de mes cours à un nouveau projet passionnant au travail.’
Larry W.
Étudiant(e) depuis 2021
’Lorsque j'ai besoin de cours sur des sujets que mon université ne propose pas, Coursera est l'un des meilleurs endroits où se rendre.’
Chaitanya A.
’Apprendre, ce n'est pas seulement s'améliorer dans son travail : c'est bien plus que cela. Coursera me permet d'apprendre sans limites.’
Here are 2 FAQs for this course: Q1: Do I need prior experience with ASP.NET or back-end development to take this course?
A basic understanding of back-end development and C# is recommended before taking this course. Familiarity with APIs and web applications will help you get the most out of the security and authentication concepts covered.
What is the difference between authentication and authorization, and will this course cover both?
Authentication verifies who you are (e.g., logging in), while authorization determines what you can access (e.g., role-based permissions). Yes, this course covers both — including ASP.NET Identity for authentication and role-based access control (RBAC) for authorization.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.