One of the great advantages of the ASP.NET Core development platform is its handling of online security features. Online security is big business, as threats to web applications continue to grow and become more and more sophisticated. The art of building security features into web applications used to be a difficult thing, but Microsoft has changed all that with .NET Core.
In this course, your understanding of C#, Visual Studio, and the .NET Core platform enables you to learn how to identify common security threats, such as cross-site scripting, cross-site request forgery, open redirects, and SQL injection. You’ll also discover how .NET Core makes it easy to secure and protect your web applications from these common attacks.
You’ll learn how to use multiple authentication methods to authenticate users within a .NET MVC web application, and how to use user roles and policies to control application or API access. In addition, you’ll use encryption, the .NET Data Protection API, and application secrets to build a secure data protection layer for a .NET MVC application, and devise effective error communication mechanisms to keep users properly informed of error conditions that may arise within the data protection layer.
Are you ready to learn how to use .NET Core’s security features in your web applications? Then join me in the first chapter, and let’s get started!
Meet Your Teacher: Andrew Jensen
I have spent more than 25 years in the IT industry and academia as an entrepreneur, manager and director, corporate trainer, software developer, technical writer, research scientist, teacher, and student. I'm the co-founder and CEO of jTEC Web Services, an IT consulting firm, and jTEC University, a soon-to-be-launched coding boot camp specializing in .NET development education. I'm also the author of the curriculum in use at Coder Foundry, a .NET-based coding boot camp headquartered in Kernersville, North Carolina, and a contributing author, instructor, and curriculum consultant here at OpenClassrooms. My research work, both in the effects of risk on technology acceptance and in IT education through embodied pedagogical agents, has been published in international academic journals and conference proceedings.