Monitoring and Security

Recap and Feedback


In the sixth part of the course, we introduced types of data that can be collected applications to study their behavior, and showcased the LGTM stack that can be used to collect and visualize traces, logs, and metrics. We also discussed the need for security throughout the application lifecycle, and highlighted some practices that can be used to improve the security of web applications.

Finally, we also learned to use a third-library called Better Auth, adding it also to the overarching project. Although we did not use it’s social sign-on functionality, Better Auth can be also used so that users can login to the application using their Apple, Google, Microsoft, etc accounts, which in turn can lead to more users signing up. For more information on the social sign-on functionality, check out the Better Auth documentation.

Loading Exercise...