Description
This course is designed for those who are looking for immersive training on authorization and data protection skills essential to protect your services and resources. You will learn strategies and tools for authorization concepts, certain design patterns to solve your federated access use cases, security tokens, and how to apply EGI policy to build secure solutions using EGI Check-in. This course will include demonstrations on how to apply these features in real-world use cases.
Who this course is for:
This course is for service providers, Information Security Team members, Security Managers, Software Developers, Architects and people who are interested in the field of becoming an authorization specialist.