Biometric information systems and software security Certificate for...
Certificate ID:
654575
Authentication Code:
364a8
Certified Person Name:
Patrick ODEH
Trainer Name:
Ahmed Yossef
Duration Days:
5
Duration Hours:
35
Course Name:
Biometric information systems and software security
Course Date:
11 October 2021 09:30 to 15 October 2021 16:30
Venue:
Marriot Accra, Ghana
Course Outline:
- IT security and secure coding
- Web application security
- Client-side security
- Foundations of Java security
- Practical cryptography
- Java security services
- XML security
- Common coding errors and vulnerabilities
- Principles of security and secure coding
- Knowledge sources
- Spring Boot, React, and Redux
- Fullstack application architecture
- RESTful APIs and Microservices overview
- Front-end vs back-end development
- Preparing the Development Environment
- Installing and configuring Spring Boot
- Installing and configuring React
- Installing and configuring Redux
- React and Redux
- Importing React app
- Working with React structures, components, and JSX
- Refactoring components
- Creating modules
- Handling events
- Adding state to a component
- Using routing for components
- Styling components
- React to Spring Boot
- Applying authentication
- Handling errors
- Securing with authenticated routes
- Refactoring React code to JavaScript modules
- Creating a Spring Boot service
- Returning a bean
- Using path variables
- Connecting front-end with RESTful API
- Using variable paths for services and APIs
- Applying form validation
- Spring Security
- Setting up Spring security
- Configuring Spring Security
- Importing JWS framework
- Working with JWS resources
- JPA and Hibernate
- Populating data
- Connecting to a JPA repository
- Deployment
- Connecting Spring Boot API
- Deploying back-end to Heroku
- Deploying React build
- Basic definitions and the scope of “biometrics” as automated human recognition technologies
- Statistical Measures And Descriptions Of Data
- Varying applications: “Verification”, “Identification”, “Clustering”, “Watch-listing”
- A short history of methods and the evolution of key concepts
- Understanding technical performance metrics
- What to consider in implementing Biometrics
- Technical, human factors, privacy & good practice, security, vulnerability, accuracy & bias
- Why passwords will always be with us
- What systems are available
- Fingerprint
- Face (including latest debates/issues)
- Iris
- Artificial intelligence and biometrics
- Creating robust systems
- The three pillars of system performance: Human factors, human factors, and human factors
- Case studies