Ruby Full Stack Development: Threads & Security
Ruby 2.5
| Intermediate
- 12 videos | 50m 36s
- Includes Assessment
- Earns a Badge
Security has become a large issue with web development, and threads often provide significant performance gains over multi-core systems. During this course, you will explore software security, encryption, and how to use threads. Work with thread variables and keys. Recognize thread priorities. Use mutexes to access shared data. Conclude by spotting potential code execution timing bugs, also known as race conditions in software, and how they can cause deadlocks between threads.
WHAT YOU WILL LEARN
-
Create and use threadsUse thread variables and thread keys to access thread dataRecognize how to set thread priorities and use mutexes to access shared data and variablesIdentify potential race conditions and how deadlocks can occur between threadsRecognize and use the ruby lang security issues listRecognize how to handle nil objects to avoid security issues
-
Create immutable methods in order to provide additional safetyRecognize how to encrypt and decrypt data using symmetric ciphersUse cryptographically secure hash functions to create hashes of dataCreate cryptographically secure random numbersGenerate secure passwords using cryptographically secure random numbers and hash functionsDescribe and use security concepts and cryptography to protect data in ruby
IN THIS COURSE
-
4m 9sThis video will teach you how to create and use threads. FREE ACCESS
-
4m 27sIn this video, find out how to use thread variables and thread keys to access data from threads. FREE ACCESS
-
6mAfter completing this video, you will be able to recognize how to set thread priorities and use mutexes to access shared data and variables. FREE ACCESS
-
4m 3sIn this video, you will identify potential race conditions and how deadlocks can occur between threads. FREE ACCESS
-
2m 38sUpon completion of this video, you will be able to recognize and use the Ruby Lang security issues list. FREE ACCESS
-
3m 43sAfter completing this video, you will be able to recognize how to handle nil objects to avoid security issues. FREE ACCESS
-
5m 4sIn this video, learn how to create immutable methods to provide additional safety. FREE ACCESS
-
4m 16sAfter completing this video, you will be able to recognize how to encrypt and decrypt data using symmetric ciphers. FREE ACCESS
-
3m 47sIn this video, find out how to use cryptographically secure hash functions to create hashes of data. FREE ACCESS
-
2m 42sIn this video, you will learn how to create random numbers that are cryptographically secure. FREE ACCESS
-
3m 23sIn this video, you will generate secure passwords using random numbers that are cryptographically secure and hash functions. FREE ACCESS
-
6m 25sUpon completion of this video, you will be able to describe and use security concepts and cryptography to protect data. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.