Certificate Authentication

Biometric information systems and software security Certificate for...

Add to LinkedIn

Certificate ID: 
654575
Authentication Code: 
364a8
Certified Person Name: 
Patrick ODEH
Trainer Name: 
Ahmed Yossef
Duration Days: 
5
Duration Hours: 
35
Course Name: 
Biometric information systems and software security
Course Date: 
11 October 2021 09:30 to 15 October 2021 16:30
Venue: 
Marriot Accra, Ghana
Course Outline: 
  • IT security and secure coding
  • Web application security
  • Client-side security
  • Foundations of Java security
  • Practical cryptography
  • Java security services
  • XML security
  • Common coding errors and vulnerabilities
  • Principles of security and secure coding
  • Knowledge sources
  • Spring Boot, React, and Redux
  • Fullstack application architecture
  •  RESTful APIs and Microservices overview
  • Front-end vs back-end development
  • Preparing the Development Environment
  • Installing and configuring Spring Boot
  • Installing and configuring React
  • Installing and configuring Redux
  • React and Redux
  • Importing React app
  • Working with React structures, components, and JSX
  • Refactoring components
  • Creating modules
  • Handling events
  • Adding state to a component
  • Using routing for components
  • Styling components
  • React to Spring Boot
  • Applying authentication
  • Handling errors
  • Securing with authenticated routes
  • Refactoring React code to JavaScript modules
  • Creating a Spring Boot service
  • Returning a bean
  • Using path variables
  • Connecting front-end with RESTful API
  • Using variable paths for services and APIs
  • Applying form validation
  • Spring Security
  • Setting up Spring security
  • Configuring Spring Security
  • Importing JWS framework
  • Working with JWS resources
  • JPA and Hibernate
  • Populating data
  • Connecting to a JPA repository
  • Deployment
  • Connecting Spring Boot API
  • Deploying back-end to Heroku
  • Deploying React build
  • Basic definitions and the scope of “biometrics” as automated human recognition technologies
  • Statistical Measures And Descriptions Of Data
  • Varying applications: “Verification”, “Identification”, “Clustering”, “Watch-listing”
  • A short history of methods and the evolution of key concepts
  • Understanding technical performance metrics
  • What to consider in implementing Biometrics
  • Technical, human factors, privacy & good practice, security, vulnerability, accuracy & bias
  • Why passwords will always be with us
  • What systems are available 
  • Fingerprint
  • Face (including latest debates/issues)
  •  Iris
  • Artificial intelligence and biometrics
  • Creating robust systems
  • The three pillars of system performance: Human factors, human factors, and human factors
  • Case studies