We may earn an affiliate commission when you visit our partners.
Paul D. Sheriff

Applications must take security into account. Learn how to add security to your Angular applications using JSON Web Tokens, claims, and the .NET Core Web API.

Read more

Applications must take security into account. Learn how to add security to your Angular applications using JSON Web Tokens, claims, and the .NET Core Web API.

Applications must take security into account, and Angular applications are no exception. In this course, Angular 4 Security Using JSON Web Tokens, you will create an authentication system and an authorization system that can be used on both the client side and the server side. First, you will learn how Angular applications must have secure UI elements on the client side, and secure your Web API calls on the server side. Then, you will use Angular, Visual Studio Code, JSON Web Tokens, claims, roles, and a .NET Core Web API to secure your Angular applications. By the end of this course, you’ll know exactly how to implement a flexible, claims-based security system, you can use in a small, medium, or large Angular application.

Enroll now

What's inside

Syllabus

Course Overview
Review and Install the Sample Application
Authenticating a User
Secure UI Elements and Guard Routes
Read more
Call Web API to Authenticate and Authorize
Use JSON Web Tokens to Secure Web API Methods
Working with Bearer Tokens in Angular
Using Claims-based Authorization

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores industry-standard concepts in Angular security
Taught by Paul D. Sheriff, who has expertise in .NET Core and Angular
Provides hands-on exercises through interactive materials
Covers essential topics for Angular security, including JWTs and claims-based authorization
Requires access to .NET Core and Visual Studio Code, which may not be readily available for all learners

Save this course

Save Angular 4 Security Using JSON Web Tokens to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Angular 4 Security Using JSON Web Tokens with these activities:
Review Course Materials and Create Study Notes
Effectively prepare for and reinforce your learning by actively reviewing course materials and creating comprehensive study notes.
Show steps
  • Review lecture slides, code samples, and assignments
  • Summarize key concepts and techniques
  • Organize and categorize study notes
Show all one activities

Career center

Learners who complete Angular 4 Security Using JSON Web Tokens will develop knowledge and skills that may be useful to these careers:
Web Developer
Web Developers design and create websites. This course, Angular 4 Security Using JSON Web Tokens, can help you build a foundation for success in this role by teaching you how to secure Angular applications on both the client and server sides. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
Information Technology (IT) Director
Information Technology (IT) Directors are responsible for overseeing an organization's IT operations. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
Security Architect
Security Architects design, implement, and maintain security measures to protect an organization's computer networks and systems. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
Software Developer
Software Developers design, develop, and maintain software. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
Chief Technology Officer (CTO)
Chief Technology Officers (CTOs) are responsible for overseeing an organization's technology strategy and operations. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for overseeing an organization's computer security program. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
IT Security Specialist
IT Security Specialists protect computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
Cybersecurity Analyst
Cybersecurity Analysts plan and implement security measures to protect an organization's computer networks and systems from cyberattacks. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
Security Consultant
Security Consultants advise organizations on how to protect their computer networks and systems from cyberattacks. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's computer networks and systems. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
Risk Analyst
Risk Analysts identify, assess, and mitigate risks to an organization's computer networks and systems. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures to protect an organization's computer networks. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
Penetration Tester
Penetration Testers assess the security of computer networks and systems by attempting to exploit vulnerabilities. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
Security Engineer
Security Engineers protect computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.
IT Auditor
IT Auditors evaluate an organization's computer networks and systems to ensure that they are secure and compliant with regulations. This course, Angular 4 Security Using JSON Web Tokens, may be useful for learning how to secure Angular applications on both the client and server sides, helping you succeed in this role. You will learn how to implement secure UI elements and guard routes, as well as work with JSON Web Tokens to secure Web API methods.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Angular 4 Security Using JSON Web Tokens.
Provides a comprehensive overview of web security and discusses best practices for securing web applications.
Provides a comprehensive guide to securing ASP.NET Core applications. It is useful for the course's discussions related to authorization systems on the server side.
Provides a comprehensive overview of applied cryptography. It explains the different types of cryptographic algorithms, and how they are used to protect data. It valuable resource for anyone who wants to learn more about applied cryptography.
Provides a white hat perspective on web security. It explains how to find and exploit security vulnerabilities in web applications. It valuable resource for anyone who wants to learn more about web security.
Provides a comprehensive overview of software security assessment. It explains how to identify and prevent software vulnerabilities. It valuable resource for anyone who wants to learn more about software security assessment.
Provides a comprehensive overview of cryptography and network security. It explains the different types of cryptographic algorithms, and how they are used to protect data. It valuable resource for anyone who wants to learn more about cryptography and network security.
Provides a comprehensive overview of network security. It explains the different types of network security threats, and how to protect against them. It valuable resource for anyone who wants to learn more about network security.
This cookbook provides a collection of recipes for securing Angular applications. It useful reference for developers who want to quickly implement security features in their applications.
Provides a comprehensive overview of secure coding. It explains the different types of security vulnerabilities, and how to prevent them. It valuable resource for anyone who wants to learn more about secure coding.
This document provides a list of the top 10 security risks for web applications. It can be useful for understanding the types of attacks that your Angular applications may face.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Angular 4 Security Using JSON Web Tokens.
API Security on Google Cloud's Apigee API Platform
Most relevant
API Security on Google Cloud's Apigee API Platform
Most relevant
Web API v2 Security
Most relevant
Introduction to JavaScript Object Notation (JSON)
Most relevant
Secure Coding in Angular
Most relevant
Node.js API Masterclass With Express & MongoDB
Most relevant
Getting Started with Node.js 4 Security with Express and...
Most relevant
OAuth 2.0 in Spring Boot Applications
Most relevant
Java EE 7: Getting Started
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser