Authorization (Computing)

Authorization in computing is a security mechanism used to determine user/client privileges or access levels related to system resources including files, services, computer programs, and data. Coursera's Authorization skill catalogue teaches you about concepts such as access control, permissions, tokens, and role-based access control systems. You'll learn how to implement authorization mechanisms in various environments, manage user permissions, design secure systems, and understand common vulnerabilities and countermeasures. This skill will equip you to protect systems and data, ensuring only approved users have access to sensitive information, a crucial aspect in today's data-driven world.
45credentials
1online degree
206courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Learn a new tool or skill in an interactive, hands-on environment.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials while taking courses that count towards your Master’s degree.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "authorization (computing)"

  • Status: New
    Status: Free Trial

    Skills you'll gain: Multi-Factor Authentication, Role-Based Access Control (RBAC), Authentications, Azure Active Directory, Zero Trust Network Access, Identity and Access Management, User Provisioning, Authorization (Computing), Security Controls, Cloud Security, User Accounts, Continuous Monitoring

  • Status: Free Trial

    Skills you'll gain: Identity and Access Management, Authentications, AWS Identity and Access Management (IAM), User Provisioning, OAuth, User Accounts, Security Controls, Role-Based Access Control (RBAC), Authorization (Computing), Single Sign-On (SSO), Cryptographic Protocols

  • Status: New
    Status: Free Trial

    Skills you'll gain: Microsoft Power Platform, Microsoft Power Automate/Flow, Development Environment, Microsoft Azure, Power BI, Data Modeling, Technical Design, Solution Architecture, Application Design, Business Logic, Platform As A Service (PaaS), Microsoft 365, No-Code Development, Data Architecture, Cloud Development, Authentications, Application Development, Authorization (Computing), Business Process Automation, Web Services

  • Status: New
    Status: Free Trial

    Skills you'll gain: Incident Response, Vulnerability Management, Computer Security Incident Management, Cyber Operations, Hardening, Cybersecurity, Security Controls, Vulnerability Assessments, Threat Detection, Identity and Access Management, Intrusion Detection and Prevention, IT Security Architecture, Information Systems Security, Vulnerability Scanning, Threat Management, Application Security, Mobile Security, Network Security, Authorization (Computing), Continuous Monitoring

  • Status: Free Trial

    Skills you'll gain: Role-Based Access Control (RBAC), Authentications, Secure Coding, ASP.NET, Microsoft Copilot, Data Security, Back-End Web Development, Authorization (Computing), Application Security, JSON, Identity and Access Management, Data Storage, .NET Framework, Application Programming Interface (API), Encryption

  • Status: Free Trial

    Skills you'll gain: Microsoft Azure, Role-Based Access Control (RBAC), Azure Active Directory, Authorization (Computing), Authentications, Identity and Access Management, Cloud Infrastructure, Cloud Computing, Cloud Security, Single Sign-On (SSO), Kubernetes, Encryption, Multi-Factor Authentication, Data Integration

  • Status: Free Trial

    Skills you'll gain: Network Security, Incident Response, Business Continuity, Disaster Recovery, Security Controls, Configuration Management, Governance, Cybersecurity, Security Management, Computer Security Incident Management, Cyber Attacks, Computer Security Awareness Training, Information Assurance, Data Security, Infrastructure Security, Risk Management Framework, Event Monitoring, Encryption, Role-Based Access Control (RBAC), Authorization (Computing)

  • Status: Free Trial

    Skills you'll gain: IT Security Architecture, Network Security, Computer Security, Application Security, Security Controls, Cybersecurity, Security Awareness, Cyber Attacks, Encryption, Data Security, Cryptography, Security Management, Authorization (Computing), Threat Management, Firewall, Network Administration, Authentications, Threat Detection, Hardening, Malware Protection

  • Status: Free Trial

    Skills you'll gain: No-Code Development, Email Automation, Business Process Automation, Application Deployment, Automation, Business Process, Workflow Management, Cloud Applications, Google Workspace, Application Design, Application Development, Application Performance Management, Data Integration, Authorization (Computing), Authentications, Google Sheets, Application Lifecycle Management, User Interface (UI), Data Management, Productivity Software

  • Status: New
    Status: Free Trial

    Skills you'll gain: Identity and Access Management, Single Sign-On (SSO), User Provisioning, User Accounts, Security Assertion Markup Language (SAML), Authorization (Computing), Authentications, Role-Based Access Control (RBAC), OAuth, Public Key Infrastructure, Multi-Factor Authentication

  • Skills you'll gain: Authentications, Authorization (Computing), Role-Based Access Control (RBAC), Identity and Access Management, Security Controls, User Provisioning, Data Access, Information Systems Security, Multi-Factor Authentication, Computer Security

  • Status: Preview

    Skills you'll gain: Application Security, Secure Coding, Data Ethics, Vulnerability Assessments, Responsible AI, Threat Modeling, Data Security, Security Controls, Cybersecurity, Artificial Intelligence, Threat Detection, Authorization (Computing), Encryption, Penetration Testing