Ruby Full Stack Development: Threads & Security

Ruby 2.5    |    Intermediate
  • 12 videos | 50m 36s
  • Includes Assessment
  • Earns a Badge
Rating 3.9 of 12 users Rating 3.9 of 12 users (12)
Security has become a large issue with web development, and threads often provide significant performance gains over multi-core systems. During this course, you will explore software security, encryption, and how to use threads. Work with thread variables and keys. Recognize thread priorities. Use mutexes to access shared data. Conclude by spotting potential code execution timing bugs, also known as race conditions in software, and how they can cause deadlocks between threads.

WHAT YOU WILL LEARN

  • Create and use threads
    Use thread variables and thread keys to access thread data
    Recognize how to set thread priorities and use mutexes to access shared data and variables
    Identify potential race conditions and how deadlocks can occur between threads
    Recognize and use the ruby lang security issues list
    Recognize how to handle nil objects to avoid security issues
  • Create immutable methods in order to provide additional safety
    Recognize how to encrypt and decrypt data using symmetric ciphers
    Use cryptographically secure hash functions to create hashes of data
    Create cryptographically secure random numbers
    Generate secure passwords using cryptographically secure random numbers and hash functions
    Describe and use security concepts and cryptography to protect data in ruby

IN THIS COURSE

  • 4m 9s
    This video will teach you how to create and use threads. FREE ACCESS
  • 4m 27s
    In this video, find out how to use thread variables and thread keys to access data from threads. FREE ACCESS
  • Locked
    3.  Recognizing Thread Priorities and Using Mutexes
    6m
    After completing this video, you will be able to recognize how to set thread priorities and use mutexes to access shared data and variables. FREE ACCESS
  • Locked
    4.  Identifying Race Conditions and Deadlocks
    4m 3s
    In this video, you will identify potential race conditions and how deadlocks can occur between threads. FREE ACCESS
  • Locked
    5.  Recognizing Ruby Lang Security Vulnerabilities
    2m 38s
    Upon completion of this video, you will be able to recognize and use the Ruby Lang security issues list. FREE ACCESS
  • Locked
    6.  Handling Nil Objects
    3m 43s
    After completing this video, you will be able to recognize how to handle nil objects to avoid security issues. FREE ACCESS
  • Locked
    7.  Creating Immutable Methods for Safety
    5m 4s
    In this video, learn how to create immutable methods to provide additional safety. FREE ACCESS
  • Locked
    8.  Using Symmetric Ciphers
    4m 16s
    After completing this video, you will be able to recognize how to encrypt and decrypt data using symmetric ciphers. FREE ACCESS
  • Locked
    9.  Using Hash Functions
    3m 47s
    In this video, find out how to use cryptographically secure hash functions to create hashes of data. FREE ACCESS
  • Locked
    10.  Creating Secure Random Numbers
    2m 42s
    In this video, you will learn how to create random numbers that are cryptographically secure. FREE ACCESS
  • Locked
    11.  Generating Secure Passwords
    3m 23s
    In this video, you will generate secure passwords using random numbers that are cryptographically secure and hash functions. FREE ACCESS
  • Locked
    12.  Exercise: Securing Data with Ruby
    6m 25s
    Upon completion of this video, you will be able to describe and use security concepts and cryptography to protect data. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 276 users Rating 4.5 of 276 users (276)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Journey Python 3
Rating 4.8 of 10 users Rating 4.8 of 10 users (10)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 322 users Rating 4.5 of 322 users (322)
Rating 4.2 of 18 users Rating 4.2 of 18 users (18)
Rating 4.6 of 47 users Rating 4.6 of 47 users (47)