Tags → #security
-
Week 7 Day 2: Rate Limiting & Throttling - Traffic Control
Token Bucket, Leaky Bucket. Preventing DDoS and abuse.
-
Week 7 Day 1: Authentication & Authorization - Who are you?
AuthN vs AuthZ. Session vs JWT. Securing your API.
-
Week 2 Day 3: Reverse Proxies - Protecting the Backend
Nginx, HAProxy, and why you should never expose your application server directly to the internet.
-
Mini Project: Secure Notes App
Week 5 Finale! We build a secure backend with Schema Validation, RBAC, and Field-Level Encryption.
-
Authentication & Authorization: Securing MongoDB
Stop using the root user! Learn how to create least-privilege users with RBAC.
-
enforce Rules: MongoDB Schema Validation
Schemaless does NOT mean structureless. Learn how to enforce data integrity at the database level using JSON Schema.