Next Steps2:01 with Kenneth Love
Where you can go to now?
We'd love to hear more about how you used the information in this course to secure your products. Let us know!
There's so much more to security that we simply can't cover in a single course. 0:00 We tried to make sure this course to be a good overview for 0:04 you at the absolutely basic security steps to take for your software. 0:06 We view this course as being more of a dictionary or a primer for 0:10 topics and areas to watch out for in your own software and tools. 0:13 Maybe you found a place or two where you can beef up your security and 0:16 help protect your users. 0:19 Hopefully, you're now feel more empowered to mitigate and 0:20 even prevent attacks on your own data and systems. 0:22 So what now? 0:26 Now, is a great time to look back at that list of vulnerabilities from the beginning 0:27 of the course and think of how you'd address each one if you're not already. 0:30 Why would someone want to gain access to your application or data? 0:34 What are the most likely ways someone would gain that access? 0:38 What data would be the most valuable to an attacker? 0:42 Assuming your application is compromised, how would that impact your users? 0:44 How would it impact your business? 0:48 What processes would you follow to fully recover from an attack? 0:50 And how could someone use your application for other illicit uses? 0:53 Investigate stronger more robust hashing and 0:57 encryption libraries in your languages and frameworks of choice. 0:59 Also, look into how your database can handle things like hashing, 1:02 encryption, access control, and more. 1:05 Usually, the more you can do inside of your database, the better. 1:08 Also, this might sound counterintuitive, but relying on third party providers like 1:11 AWS, Azure, and Google Cloud can increase your security, too. 1:15 Most Cloud providers also provide their own ACLs, intrusion detection, and 1:19 other security tools like monitoring. 1:22 Much like using Facebook for 1:25 authentication, you can often get a bigger bang for 1:26 your buck by letting someone specialized worry about these specific areas. 1:28 If you want to learn more about the technologies, techniques and 1:32 approaches that we covered in this course, look for other courses and workshops, 1:34 here on Treehouse about them. 1:38 We cover subjects like authentication for individual languages and frameworks and 1:39 their relevant topic areas. 1:42 If we haven't covered something you'd like to see, be sure to reach out to us. 1:44 You could email each teacher or check the trailer board for 1:47 each language, links to the board are in the teacher's nests. 1:49 Thank you for joining me on this tour of basic security concerns. 1:52 Please use the feedback buttons at the end of this course to tell us what you thought 1:55 of it, and future courses and workshops that you'd like to see. 1:58 Thanks again. 2:01
You need to sign up for Treehouse in order to download course files.Sign up