We will be creating an interesting and technically sound design of a security application. Follow the activities below as the semester progresses.
Please note that activities are subject to change!
- A: Brainstorming and Setup
- B: Basic File Store Web API
- C: Relational Database and ORM
- D: Database Hardening
- E: Secure User Accounts
- F: User Authentication and Sessions
- G: Secure Session
- H: Token Based Authorization
- I: Policies and Validation
- J: OAuth Protocol and Single-Table Inheritance
- K: Signed Clients and XSS Prevention
- L: Final Presentations