Heads up! To view this whole video, sign in with your Courses account or enroll in your free 7-day trial. Sign In Enroll
Preview
Start a free Courses trial
to watch this video
Where you can go to now?
We'd love to hear more about how you used the information in this course to secure your products. Let us know!
Related Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upRelated Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign up
There's so much more to security that we
simply can't cover in a single course.
0:00
We tried to make sure this
course to be a good overview for
0:04
you at the absolutely basic security
steps to take for your software.
0:06
We view this course as being more
of a dictionary or a primer for
0:10
topics and areas to watch out for
in your own software and tools.
0:13
Maybe you found a place or two where
you can beef up your security and
0:16
help protect your users.
0:19
Hopefully, you're now feel
more empowered to mitigate and
0:20
even prevent attacks on your own data and
systems.
0:22
So what now?
0:26
Now, is a great time to look back at that
list of vulnerabilities from the beginning
0:27
of the course and think of how you'd
address each one if you're not already.
0:30
Why would someone want to gain
access to your application or data?
0:34
What are the most likely ways
someone would gain that access?
0:38
What data would be the most
valuable to an attacker?
0:42
Assuming your application is compromised,
how would that impact your users?
0:44
How would it impact your business?
0:48
What processes would you follow
to fully recover from an attack?
0:50
And how could someone use your
application for other illicit uses?
0:53
Investigate stronger
more robust hashing and
0:57
encryption libraries in your languages and
frameworks of choice.
0:59
Also, look into how your database
can handle things like hashing,
1:02
encryption, access control, and more.
1:05
Usually, the more you can do inside
of your database, the better.
1:08
Also, this might sound counterintuitive,
but relying on third party providers like
1:11
AWS, Azure, and Google Cloud can
increase your security, too.
1:15
Most Cloud providers also provide their
own ACLs, intrusion detection, and
1:19
other security tools like monitoring.
1:22
Much like using Facebook for
1:25
authentication, you can
often get a bigger bang for
1:26
your buck by letting someone specialized
worry about these specific areas.
1:28
If you want to learn more about
the technologies, techniques and
1:32
approaches that we covered in this course,
look for other courses and workshops,
1:34
here on Treehouse about them.
1:38
We cover subjects like authentication for
individual languages and frameworks and
1:39
their relevant topic areas.
1:42
If we haven't covered something you'd
like to see, be sure to reach out to us.
1:44
You could email each teacher or
check the trailer board for
1:47
each language, links to the board
are in the teacher's nests.
1:49
Thank you for joining me on this
tour of basic security concerns.
1:52
Please use the feedback buttons at the end
of this course to tell us what you thought
1:55
of it, and future courses and
workshops that you'd like to see.
1:58
Thanks again.
2:01
You need to sign up for Treehouse in order to download course files.
Sign upYou need to sign up for Treehouse in order to set up Workspace
Sign up