Security Mindset
Handling Sensitive Data
Authentication & Authorization
Session Management
JWT
Spring Security
Practice
Assignment
Back end Track
Under construction
<aside>
🚧
This page is currently under construction. Please check back later.
</aside>
Implementation plan:
- What is sensitive data — passwords, PII, tokens, keys
- Never store passwords in plain text
- Hashing vs encryption — conceptual difference
- Hashing: one-way, deterministic, used for passwords
- Encryption: reversible with a key, used for data in transit/at rest
bcrypt — why it's recommended for password hashing
- Salt and work factor in bcrypt
- Implementing password hashing in Java with bcrypt
- What not to log (passwords, tokens, PII) — GDPR awareness
- Exercise: implement secure password storage
The HackYourFuture curriculum is licensed under CC BY-NC-SA 4.0

*https://hackyourfuture.net/*
Found a mistake or have a suggestion? Let us know in the feedback form.