React: Securing Applications

React: Securing Applications

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 03m | 174 MB

You’ve built an application around React, using it and other libraries to create a smooth and attractive application. Everything works—but does it work securely? Applications that look great and perform well can still be at risk of attack. This course provides clear, focused steps you can take to reinforce your React applications and authentication methods to defend against common threats. First, instructor Emmanuel Henri explains how common attacks work and gets you started setting up solutions that can protect your applications. Next, he shows how to improve the security of your authentication methods using Auth0, followed by how to secure your API endpoint by leveraging other features from Auth0. By the end of this course, you’ll be equipped with the best practices you need to safeguard your files, code, data, routes, servers, and users.

Table of Contents

Introduction
1 Securing React applications
2 What you should know

Setting Up
3 Initial setup
4 Set up flow
5 Set up ESLint

Overview of Security Threats
6 Introduction to OWASP
7 Cross-site scripting (XSS) attacks
8 Cross-site request forgery (CSRF)
9 Introduction to JSON Web Token (JWT) and what it solves

Authentication with Auth0
10 Initial setup of your server
11 Create your API endpoints
12 Initial Auth0 setup
13 Adding the files and code from Auth0
14 Update index for Auth0 integration
15 Add connections to server
16 Finalize menu with login

Other React Considerations
17 React considerations for security
18 Strict mode

Conclusion
19 Next steps