Open Authentication (OAuth) Training Course
Open Authentication (OAuth) is an open technology standard utilized for website authentication. It outlines how unrelated servers and services can safely grant authenticated access to assets without the need to share credentials.
This instructor-led, live training (available online or onsite) is designed for developers and any individuals seeking to learn and implement OAuth to provide applications with secure delegated access.
By the conclusion of this training, participants will be able to:
- Acquire a solid understanding of OAuth fundamentals.
- Comprehend native applications and their distinct security challenges when employing OAuth.
- Learn about and understand the common extensions to the OAuth protocols.
- Integrate with any OAuth authorization server.
Course Format
- Interactive lectures and discussions.
- Ample opportunities for exercises and practice.
- Hands-on implementation within a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction
- Overview of OAuth
- Understanding API security
OAuth
- Protocol endpoints
- Scope
- Authorization code for web apps
- Implicit flow for single-page apps
- Client credentials for machines
- Resource owner password credentials
- Long-lived access with refresh tokens
- Choosing the right response mode
- Simplifying OAuth with OAuth 2.1
Native Applications Best Practices
- Unique issues of native apps
- Using PKCE to handle stolen tokens
- Choosing the best redirect URI
Browser-based Application Best Practices
- The security profile of the browser-based app
- OAuth within the browser
- Avoiding OAuth with SameSite cookies
- Securing browser-based apps with backend for frontend
Extending OAuth
- OAuth and Identity with OpenID Connect
- Configuring clients with OAuth metadata
- Authorizing the IoT with the OAuth device flow
- Combining SAML and OAuth with the SAML assertion grant
- Securing Microservices with token exchange
Summary and Next Steps
Requirements
- Basic knowledge of web service and API development
Audience
- Developers
Need help picking the right course?
Open Authentication (OAuth) Training Course - Enquiry
Testimonials (4)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
Upcoming Courses
Related Courses
Introduction to ISO27001
7 HoursThis guided, live training session in the UAE (available online or onsite) targets beginner-level professionals seeking to understand ISO 27001 and its role in boosting organizational information security.
By the conclusion of this training, participants will be able to:
- Understand the purpose and benefits of an ISMS.
- Familiarize themselves with key ISO 27001 concepts, terms, and principles.
- Recognize the role of an auditor in ensuring compliance.
- Gain insight into the audit process and continual improvement within ISO 27001.
AI and IT Audit
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level IT auditors who wish to effectively incorporate AI tools in their audit practices.
By the end of this training, participants will be able to:
- Grasp the core concepts of artificial intelligence and how it is applied in the context of IT auditing.
- Utilize AI technologies such as machine learning, NLP, and RPA to improve audit efficiency, accuracy, and scope.
- Perform risk assessments using AI tools, enabling continuous monitoring and proactive risk management.
- Integrate AI into audit planning, execution, and reporting, enhancing the overall effectiveness of IT audits.
Basel III – Certified Basel Professional
21 HoursDescription:
Basel III represents a global regulatory framework governing bank capital adequacy, stress testing, and market liquidity risk. Originally agreed upon by the Basel Committee on Banking Supervision in 2010–11, the Accord has seen its implementation timeline extended to March 31, 2019. This framework strengthens bank capital requirements by enhancing liquidity standards and reducing leverage.
Unlike Basel I and II, Basel III introduces differentiated reserve requirements based on various deposit types and borrowing structures. Rather than replacing its predecessors, it complements Basel I and II. Navigating this complex and evolving regulatory landscape can be challenging; our course and training provide the expertise needed to manage potential changes and their impact on your institution. As an accredited training partner of the Basel Certification Institute, we guarantee that our training materials and quality remain up-to-date and effective.
Objectives:
- Prepare participants for the Certified Basel Professional Examination.
- Define practical strategies and techniques for defining, measuring, analyzing, improving, and controlling operational risk within banking organizations.
Target Audience:
- Board members with risk responsibilities
- Chief Risk Officers (CROs) and Heads of Risk Management
- Members of the Risk Management team
- Compliance, legal, and IT support staff
- Equity and Credit Analysts
- Portfolio Managers
- Rating Agency Analysts
Overview:
- Introduction to Basel norms and amendments to the Basel Accord (III)
- Regulations concerning market, credit, counterparty, and liquidity risk
- Stress testing for various risk measures, including formulation and delivery methods
- Anticipated effects of Basel III on the international banking industry, including demonstrations of practical application
- Rationale for the New Basel Norms
- Overview of the Basel III Norms
- Objectives of The Basel III Norms
- Basel III Implementation Timeline
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This intensive four-day event (CGEIT training) serves as the definitive preparation for the examination phase, specifically engineered to guarantee that you successfully pass the rigorous CGEIT exam on your initial attempt.
The CGEIT qualification is an internationally acclaimed symbol of excellence in IT governance, awarded by ISACA. It is tailored for professionals tasked with managing IT governance or those holding significant advisory or assurance responsibilities within this domain.
Attaining CGEIT status will enhance your market recognition and amplify your influence at the executive level.
Objectives:
This seminar has been crafted to prepare delegates for the CGEIT examination by enabling them to augment their existing knowledge and understanding, ensuring they are better equipped to pass the exam as defined by ISACA.
Target Audience:
Our training course is designed for IT and business professionals with substantial IT governance experience who are preparing to undertake the CGEIT exam.
COBIT 2019 Foundation
21 HoursLearning Objectives
This COBIT 2019 Foundation course serves as a comprehensive introduction to the COBIT 2019 framework. It equips participants with the knowledge to utilize an integrated business framework for the governance and management of enterprise IT, facilitating IT-business alignment, cost efficiency, and enhanced productivity. The curriculum encompasses the following key areas:
- Introduction to the new framework
- Essential concepts and terminology
- Principles of Governance and the Framework
- Governance systems and their components
- Objectives for Governance and Management
- Performance management strategies
- Designing a customized governance system
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in the UAE (online or onsite) is designed for compliance professionals in the payment services sector who wish to create, implement, and enforce a comprehensive compliance program within their organization.
By the end of this training, participants will be able to:
- Understand the regulatory requirements set by government authorities for payment service providers.
- Establish internal policies and procedures necessary to satisfy government regulations.
- Implement a compliance program that adheres to relevant laws.
- Ensure that all corporate processes and procedures align with the compliance program.
- Protect the business's reputation and shield it from potential lawsuits.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursThis live, instructor-led training in the UAE (online or onsite) is tailored for intermediate-level cybersecurity professionals seeking to enhance their understanding of GRC frameworks and apply them to secure and compliant business operations.
By the end of this training, participants will be able to:
- Understand the key components of cybersecurity governance, risk, and compliance.
- Conduct risk assessments and develop risk mitigation strategies.
- Implement compliance measures and manage regulatory requirements.
- Develop and enforce security policies and procedures.
Accessibility by Design (Compliance with EU ACT)
21 HoursThis course offers a comprehensive introduction to the recently enacted Accessibility Law, empowering developers with the practical expertise needed to design, develop, and sustain fully accessible applications. Beginning with an exploration of the law's significance and implications, the curriculum swiftly transitions into hands-on coding methodologies, tools, and testing strategies to guarantee compliance and inclusivity for users with disabilities.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse Objective:
Equip participants with a solid grasp of GRC processes and capabilities, along with the practical skills needed to effectively integrate governance, performance management, risk management, internal control, and compliance activities.
Course Overview:
- Essential GRC terminology and definitions
- Foundational principles of GRC
- Core components, practices, and activities
- The interrelationship between GRC and other professional disciplines
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
ISO 27002 Lead Manager
35 HoursThe ISO/IEC 27002 Lead Manager training program empowers you with the essential expertise and knowledge required to assist organizations in implementing and managing Information Security controls in accordance with ISO/IEC 27002.
Upon successful completion of this course, you will be eligible to sit for the exam and apply for the “PECB Certified ISO/IEC 27002 Lead Manager” credential. This PECB Lead Manager Certification validates your mastery of the principles and techniques necessary for the implementation and management of Information Security controls based on ISO/IEC 27002.
Who should attend?
- Managers or consultants aiming to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 and ISO/IEC 27002
- Project managers or consultants looking to master the Information Security Management System implementation process
- Professionals responsible for information security, compliance, risk, and governance within an organization
- Members of information security teams
- Expert advisors in information technology
- Information Security officers
- Privacy officers
- IT professionals
- CTOs, CIOs, and CISOs
Learning objectives
- Master the implementation of Information Security controls by adhering to the framework and principles of ISO/IEC 27002
- Gain a comprehensive understanding of the concepts, approaches, standards, methods, and techniques required for the effective implementation and management of Information Security controls
- Comprehend the relationships between the components of Information Security controls, including responsibility, strategy, acquisition, performance, conformance, and human behavior
- Understand the significance of information security for organizational strategy
- Master the implementation of information security management processes
- Master the formulation and implementation of security requirements and objectives
Educational approach
- This training integrates both theoretical foundations and practical application
- Lecture sessions illustrated with examples from real-world case studies
- Practical exercises based on case studies
- Review exercises to support exam preparation
- Practice tests similar to the certification exam format
General Information
- Certification fees are included in the exam price
- Participants will receive training material containing over 500 pages of information and practical examples
- A participation certificate granting 31 CPD (Continuing Professional Development) credits will be issued to participants
- In the event of an exam failure, you may retake the exam within 12 months at no additional cost
PECB ISO/IEC 27001 Lead Implementer
35 HoursInformation security threats and attacks are constantly evolving and becoming more sophisticated. The most effective defense against these risks lies in the proper implementation and management of information security controls and industry best practices. Furthermore, robust information security is a critical expectation and requirement for customers, legislators, and other stakeholders.
This training course is specifically designed to prepare participants for implementing an Information Security Management System (ISMS) in accordance with ISO/IEC 27001. It aims to provide a thorough understanding of ISMS best practices and establish a framework for its ongoing management and continuous improvement.
Upon completion of the training course, participants are eligible to sit for the exam. By successfully passing, you can apply for the “PECB Certified ISO/IEC 27001 Lead Implementer” credential, which validates your ability and practical knowledge in implementing an ISMS based on ISO/IEC 27001 requirements.
Who Can Attend?
- Project managers and consultants involved in or concerned with the implementation of an ISMS
- Expert advisors seeking to master ISMS implementation
- Individuals responsible for ensuring conformity to information security requirements within an organization
- Members of an ISMS implementation team
General information
- Certification fees are included in the exam price
- Training material containing over 450 pages of information and practical examples will be distributed
- A participation certificate granting 31 CPD (Continuing Professional Development) credits will be issued
- In the event of an exam failure, you may retake the exam within 12 months free of charge
Educational approach
- This training course includes essay-type exercises, multiple-choice quizzes, examples, and best practices related to ISMS implementation.
- Participants are encouraged to communicate with each other and engage in discussions while completing quizzes and exercises.
- The exercises are based on a case study.
- The structure of the quizzes mirrors that of the certification exam.
Learning objectives
This training course will help you:
- Gain a comprehensive understanding of the concepts, approaches, methods, and techniques used for implementing and effectively managing an ISMS
- Recognize the correlation between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
- Understand the operation of an information security management system and its processes based on ISO/IEC 27001
- Learn how to interpret and implement the requirements of ISO/IEC 27001 within the specific context of an organization
- Acquire the necessary knowledge to support an organization in effectively planning, implementing, managing, monitoring, and maintaining an ISMS
Compliance and the Management of Compliance Risk
21 HoursAudience
This course is designed for all staff members seeking a practical grasp of Compliance and effective Risk Management.
Course Format
The training employs a blended methodology that encompasses:
- Facilitated discussions
- Slide-based presentations
- Case studies
- Real-world examples
Course Objectives
Upon completion of the course, participants will be able to:
Gain a robust understanding of key Compliance aspects, alongside national and international initiatives focused on managing related risks.
Articulate how organizations and their teams can establish a robust Compliance Risk Management Framework.
Clarify the roles and responsibilities of the Compliance Officer and the Money Laundering Reporting Officer, and comprehend how these functions integrate within a business structure.
Identify critical risk areas within Financial Crime, with specific attention to international operations, offshore centers, and high-net-worth clients.
Open Source Software (OSS) Management
14 HoursOpen Source Software (OSS) Management involves supervising the entire lifecycle of open-source components within an organization to ensure their secure, compliant, and efficient utilization.
This instructor-led live training, available online or onsite, targets intermediate IT professionals seeking to implement best practices for managing open-source software in enterprise and government settings.
Upon completion of this course, participants will be equipped to:
- Develop robust OSS policies and governance frameworks.
- Leverage Software Bill of Materials (SBOM) and Software Composition Analysis (SCA) tools to identify, track, and manage open-source dependencies.
- Reduce risks related to licensing and security vulnerabilities.
- Optimize OSS adoption to drive innovation and achieve cost savings.
Course Format
- Interactive lectures and group discussions.
- Case studies and scenario-based exercises.
- Practical demonstrations using OSS management tools.
Customization Options
- This course can be tailored to align with specific organizational OSS policies and toolchains. Please contact us to arrange customization.
PCI-DSS Practitioner
14 HoursThis instructor-led, live Payment Card Industry Professional training in the UAE (online or onsite) offers a professional qualification for industry practitioners aiming to demonstrate their expertise and understanding of the PCI Data Security Standard (PCI DSS).
Upon completion of this training, participants will be able to:
- Grasp the payment process and the PCI standards established to safeguard it.
- Comprehend the roles and responsibilities of entities within the payment industry.
- Gain in-depth insight into and understanding of the 12 PCI DSS requirements.
- Showcase knowledge of PCI DSS and its application to organizations involved in the transaction process.