We may earn an affiliate commission when you visit our partners.
CodeMash

CodeMash 2020 | Explain It to Me Like I'm 5: OAuth2 & OpenID | Daniel Mikusa

Read more

CodeMash 2020 | Explain It to Me Like I'm 5: OAuth2 & OpenID | Daniel Mikusa

In this talk, you'll learn about Oauth2 and OpenID starting with their basic concepts presented in the simplest light possible. From there, the session will take a practical focus, and Daniel Mikusa will show you what you need to know as a developer, share tools and libraries to make your life easier and, of course, present concrete examples in Java, .NET, and for static apps.

Enroll now

What's inside

Syllabus

Explain It to Me Like I'm 5: OAuth2 & OpenID

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explains basic concepts of OAuth2 and OpenID in a simplified manner
Provides practical examples of OAuth2 and OpenID in Java, .NET, and static apps
Taught by Daniel Mikusa, an experienced developer and speaker in OAuth2 and OpenID
Develops skills in implementing and using OAuth2 and OpenID in various applications

Save this course

Save Explain It to Me Like I'm 5: OAuth2 & OpenID: CodeMash to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Explain It to Me Like I'm 5: OAuth2 & OpenID: CodeMash. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Explain It to Me Like I'm 5: OAuth2 & OpenID: CodeMash will develop knowledge and skills that may be useful to these careers:
Software Engineer
As a Software Engineer, you will build, deploy, and maintain software systems that meet various user needs. This course on Explain It to Me Like I'm 5: OAuth2 & OpenID can be an important step toward a position in this field. The course covers topics such as OAuth and OpenID, which are widely used industry standards for secure authentication and authorization. Familiarity with these topics can help build a foundation for your programming career and make you a desirable candidate for Software Engineer roles.
Web Developer
Web Developers are responsible for designing, developing, and maintaining websites and web applications. This course on Explain It to Me Like I'm 5: OAuth2 & OpenID can be beneficial for Web Developers, as it covers essential concepts and protocols for secure user authentication and authorization on the web. Understanding and implementing these concepts can enhance the security and user experience of web applications, making you a more effective Web Developer.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course on Explain It to Me Like I'm 5: OAuth2 & OpenID can be an asset to Information Security Analysts, as it provides a comprehensive overview of OAuth and OpenID, which are widely adopted protocols for secure authentication and authorization. Understanding these protocols is critical for securing web applications and APIs, a key aspect of an Information Security Analyst's role.
Security Engineer
Security Engineers design, implement, and maintain security measures to protect an organization's computer systems and networks. The course on Explain It to Me Like I'm 5: OAuth2 & OpenID is highly relevant to Security Engineers, as it covers concepts and protocols essential for securing web applications and APIs. Specifically, the course provides a deep dive into OAuth and OpenID, which are widely used for secure authentication and authorization. Understanding and implementing these protocols is a key aspect of a Security Engineer's role.
Systems Engineer
Systems Engineers design, implement, and maintain computer systems that meet an organization's needs. The course on Explain It to Me Like I'm 5: OAuth2 & OpenID can be a valuable asset to Systems Engineers, as it provides a deep understanding of concepts and protocols related to secure authentication and authorization. This understanding is critical for designing and implementing secure systems, making you a more effective Systems Engineer.
Network Engineer
Network Engineers design, implement, and maintain computer networks that enable communication and data transfer within an organization. Understanding and implementing secure authentication and authorization protocols is a key aspect of a Network Engineer's role, as it helps ensure the security of network resources and data. The course on Explain It to Me Like I'm 5: OAuth2 & OpenID can provide valuable insights into these protocols, making you a more well-rounded Network Engineer.
Database Administrator
Database Administrators are responsible for managing and maintaining an organization's databases. While not directly related to their core responsibilities, a course on Explain It to Me Like I'm 5: OAuth2 & OpenID can provide Database Administrators with a foundational understanding of secure authentication and authorization protocols. This knowledge can be beneficial in managing user access to sensitive database information and ensuring the integrity and security of the database.
Cloud Architect
Cloud Architects design and manage cloud computing systems and services. Understanding and implementing secure authentication and authorization is critical in cloud environments, as it helps protect sensitive data and resources. The course on Explain It to Me Like I'm 5: OAuth2 & OpenID provides a deep dive into these concepts and protocols, making you a more effective Cloud Architect.
DevOps Engineer
DevOps Engineers bridge the gap between software development and IT operations, ensuring seamless delivery and maintenance of software systems. A course on Explain It to Me Like I'm 5: OAuth2 & OpenID can be beneficial for DevOps Engineers, as it provides insights into secure authentication and authorization mechanisms used in modern software development. This knowledge can help DevOps Engineers build and manage secure software pipelines and infrastructure.
Security Consultant
Security Consultants provide expert advice and guidance to organizations on security best practices, risk management, and compliance. Understanding and implementing secure authentication and authorization is a fundamental aspect of security consulting. The course on Explain It to Me Like I'm 5: OAuth2 & OpenID can equip you with a strong foundation in these concepts, making you a more effective Security Consultant.
Risk Analyst
Risk Analysts identify, assess, and manage risks to an organization's assets and operations. Understanding and implementing secure authentication and authorization protocols is critical for Risk Analysts, as it helps them evaluate and mitigate risks related to unauthorized access, data breaches, and other security threats. The course on Explain It to Me Like I'm 5: OAuth2 & OpenID can provide Risk Analysts with valuable insights into these concepts and protocols.
Compliance Officer
Compliance Officers ensure that an organization complies with applicable laws, regulations, and standards. Understanding and implementing secure authentication and authorization protocols is important for Compliance Officers, as it helps them ensure compliance with data protection and privacy regulations. The course on Explain It to Me Like I'm 5: OAuth2 & OpenID can provide Compliance Officers with a foundational understanding of these protocols and their role in maintaining compliance.
Forensic Analyst
Forensic Analysts investigate and analyze digital evidence to uncover and prevent cybercrimes. Understanding and implementing secure authentication and authorization protocols is beneficial for Forensic Analysts, as it helps them analyze and interpret digital evidence related to unauthorized access, hacking, and other security incidents. The course on Explain It to Me Like I'm 5: OAuth2 & OpenID can provide valuable insights into these protocols and their role in digital forensics.
IT Auditor
IT Auditors evaluate an organization's IT systems and processes to ensure compliance with regulations and best practices. Understanding and implementing secure authentication and authorization protocols is critical for IT Auditors, as it helps them assess the effectiveness of an organization's security measures. The course on Explain It to Me Like I'm 5: OAuth2 & OpenID can provide IT Auditors with a foundational understanding of these protocols and their role in IT auditing.
Information Technology Manager
Information Technology Managers plan, implement, and manage an organization's IT systems and infrastructure. Understanding and implementing secure authentication and authorization protocols is essential for Information Technology Managers, as it helps them ensure the security and integrity of the IT systems they manage. The course on Explain It to Me Like I'm 5: OAuth2 & OpenID can provide Information Technology Managers with a comprehensive overview of these concepts and their practical applications.

Reading list

We haven't picked any books for this reading list yet.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser