01. Course Overview\01. Course Overview.mp4 |
3,900,128 |
2AA0EFEB |
01. Course Overview\01. Course Overview.srt |
2,716 |
9F5D848C |
02. Understanding the Complexities of Microservices Security\01. Course Introduction.mp4 |
9,530,343 |
DEBE0373 |
02. Understanding the Complexities of Microservices Security\01. Course Introduction.srt |
7,511 |
7CB5234D |
02. Understanding the Complexities of Microservices Security\02. Microservices Security Challenges.mp4 |
13,456,812 |
BEE06AB5 |
02. Understanding the Complexities of Microservices Security\02. Microservices Security Challenges.srt |
11,098 |
24F35D22 |
02. Understanding the Complexities of Microservices Security\03. Module Wrap Up.mp4 |
1,828,592 |
2F8E1F93 |
02. Understanding the Complexities of Microservices Security\03. Module Wrap Up.srt |
1,814 |
846952F6 |
03. Securing the Perimeter around Your Microservices\01. Module Introduction.mp4 |
879,912 |
D62B1165 |
03. Securing the Perimeter around Your Microservices\01. Module Introduction.srt |
805 |
B9C1F7B7 |
03. Securing the Perimeter around Your Microservices\02. Challenges with Edge Security.mp4 |
6,627,106 |
64794339 |
03. Securing the Perimeter around Your Microservices\02. Challenges with Edge Security.srt |
6,242 |
35480F60 |
03. Securing the Perimeter around Your Microservices\03. API Gateway. Exposing Your API Securely.mp4 |
6,576,910 |
0435D2B2 |
03. Securing the Perimeter around Your Microservices\03. API Gateway. Exposing Your API Securely.srt |
4,682 |
739446C4 |
03. Securing the Perimeter around Your Microservices\04. Should You Consider Basic Authentication.mp4 |
4,530,399 |
05E42D7B |
03. Securing the Perimeter around Your Microservices\04. Should You Consider Basic Authentication.srt |
3,894 |
3F9115EA |
03. Securing the Perimeter around Your Microservices\05. Authenticating Clients with Certificates.mp4 |
5,887,545 |
742D9674 |
03. Securing the Perimeter around Your Microservices\05. Authenticating Clients with Certificates.srt |
4,101 |
10708B15 |
03. Securing the Perimeter around Your Microservices\06. Introducing Tokens.mp4 |
4,880,397 |
4EFBE707 |
03. Securing the Perimeter around Your Microservices\06. Introducing Tokens.srt |
4,262 |
724272E7 |
03. Securing the Perimeter around Your Microservices\07. Leveraging a Security Token Service.mp4 |
9,299,156 |
18D73A3C |
03. Securing the Perimeter around Your Microservices\07. Leveraging a Security Token Service.srt |
7,111 |
F79D46B1 |
03. Securing the Perimeter around Your Microservices\08. By-references vs. By-value Tokens.mp4 |
13,984,962 |
2D87CC51 |
03. Securing the Perimeter around Your Microservices\08. By-references vs. By-value Tokens.srt |
8,135 |
65BB5BBA |
03. Securing the Perimeter around Your Microservices\09. Json Web Tokens.mp4 |
4,981,265 |
3E58B84B |
03. Securing the Perimeter around Your Microservices\09. Json Web Tokens.srt |
4,587 |
B51843CB |
03. Securing the Perimeter around Your Microservices\10. Delegated Authorization with OAuth2.mp4 |
12,964,301 |
6E814A4C |
03. Securing the Perimeter around Your Microservices\10. Delegated Authorization with OAuth2.srt |
9,884 |
D20DA3CA |
03. Securing the Perimeter around Your Microservices\11. The Reasons for OpenID Connect.mp4 |
13,446,980 |
36E6271D |
03. Securing the Perimeter around Your Microservices\11. The Reasons for OpenID Connect.srt |
11,922 |
B459A34F |
03. Securing the Perimeter around Your Microservices\12. Options for an API Gateway and Authorization Server.mp4 |
5,292,296 |
F5FAC72E |
03. Securing the Perimeter around Your Microservices\12. Options for an API Gateway and Authorization Server.srt |
5,146 |
5964F4D2 |
03. Securing the Perimeter around Your Microservices\13. Module Wrap Up.mp4 |
4,829,462 |
B6E8A719 |
03. Securing the Perimeter around Your Microservices\13. Module Wrap Up.srt |
2,972 |
2451D99C |
04. Securing the Communication between Your Microservices\01. Module Introduction.mp4 |
7,283,509 |
0222E774 |
04. Securing the Communication between Your Microservices\01. Module Introduction.srt |
6,593 |
CBD999C7 |
04. Securing the Communication between Your Microservices\02. Mutual Transport Layer Security.mp4 |
9,495,476 |
767F9943 |
04. Securing the Communication between Your Microservices\02. Mutual Transport Layer Security.srt |
8,631 |
636ABF1B |
04. Securing the Communication between Your Microservices\03. A Closer Look at the Trust Bootstrap Problem.mp4 |
5,130,509 |
68B6B4E8 |
04. Securing the Communication between Your Microservices\03. A Closer Look at the Trust Bootstrap Problem.srt |
4,285 |
CA0193DD |
04. Securing the Communication between Your Microservices\04. Introducing the Demo.mp4 |
12,281,367 |
23A34CE1 |
04. Securing the Communication between Your Microservices\04. Introducing the Demo.srt |
7,552 |
6C74C586 |
04. Securing the Communication between Your Microservices\05. Using Tokens.mp4 |
12,171,292 |
325B87C0 |
04. Securing the Communication between Your Microservices\05. Using Tokens.srt |
6,573 |
F5AD7445 |
04. Securing the Communication between Your Microservices\06. OAuth2 Token Exchange.mp4 |
5,372,006 |
0E7C391B |
04. Securing the Communication between Your Microservices\06. OAuth2 Token Exchange.srt |
4,411 |
E733D1F7 |
04. Securing the Communication between Your Microservices\07. Sharing User Context between Your Microservices.mp4 |
10,650,956 |
A572CD52 |
04. Securing the Communication between Your Microservices\07. Sharing User Context between Your Microservices.srt |
6,374 |
A12EBC79 |
04. Securing the Communication between Your Microservices\08. Non-repudiation with Self-issued and Nested JWTs.mp4 |
3,504,222 |
96D07103 |
04. Securing the Communication between Your Microservices\08. Non-repudiation with Self-issued and Nested JWTs.srt |
3,077 |
97865331 |
04. Securing the Communication between Your Microservices\09. Service to Service with OAuth2 Client Credentials Flow.mp4 |
6,961,556 |
7BBF9346 |
04. Securing the Communication between Your Microservices\09. Service to Service with OAuth2 Client Credentials Flow.srt |
4,053 |
26CCA581 |
04. Securing the Communication between Your Microservices\10. Scope Based Authorization with OAuth2.mp4 |
6,161,211 |
F1D90FD3 |
04. Securing the Communication between Your Microservices\10. Scope Based Authorization with OAuth2.srt |
5,292 |
1B7CEB34 |
04. Securing the Communication between Your Microservices\11. Claims Based Access Control.mp4 |
2,791,393 |
462CE3AF |
04. Securing the Communication between Your Microservices\11. Claims Based Access Control.srt |
2,802 |
5EAB12DC |
04. Securing the Communication between Your Microservices\12. Authorization as a Service.mp4 |
7,122,805 |
8BB6D308 |
04. Securing the Communication between Your Microservices\12. Authorization as a Service.srt |
4,764 |
5E6E3112 |
04. Securing the Communication between Your Microservices\13. Module Wrap Up.mp4 |
3,225,454 |
EAF66FEB |
04. Securing the Communication between Your Microservices\13. Module Wrap Up.srt |
3,358 |
9A11B1DC |
05. Securing the Communication between Your Microservices and Public Clients\01. Module Introduction.mp4 |
4,708,844 |
B8AACB75 |
05. Securing the Communication between Your Microservices and Public Clients\01. Module Introduction.srt |
3,513 |
10417073 |
05. Securing the Communication between Your Microservices and Public Clients\02. Challenges with Public Clients.mp4 |
10,380,364 |
C5050986 |
05. Securing the Communication between Your Microservices and Public Clients\02. Challenges with Public Clients.srt |
5,020 |
981236A6 |
05. Securing the Communication between Your Microservices and Public Clients\03. Authorization Code Flow with PKCE by OAuth2 Clients.mp4 |
2,794,779 |
C472A8AE |
05. Securing the Communication between Your Microservices and Public Clients\03. Authorization Code Flow with PKCE by OAuth2 Clients.srt |
2,443 |
0993190A |
05. Securing the Communication between Your Microservices and Public Clients\04. Handling of the Access Token.mp4 |
8,244,695 |
2F2E2C42 |
05. Securing the Communication between Your Microservices and Public Clients\04. Handling of the Access Token.srt |
5,093 |
275CFFFD |
05. Securing the Communication between Your Microservices and Public Clients\05. Understanding Cross-origin Resource Sharing.mp4 |
6,816,483 |
BC6BA258 |
05. Securing the Communication between Your Microservices and Public Clients\05. Understanding Cross-origin Resource Sharing.srt |
3,374 |
1979D03E |
05. Securing the Communication between Your Microservices and Public Clients\06. Module Wrap Up.mp4 |
2,703,758 |
7177B60A |
05. Securing the Communication between Your Microservices and Public Clients\06. Module Wrap Up.srt |
2,583 |
578268AF |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\01. Module Introduction.mp4 |
1,187,873 |
C1F324AA |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\01. Module Introduction.srt |
1,113 |
6F657FFA |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\02. Challenges with JWT.mp4 |
4,495,889 |
16721EBA |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\02. Challenges with JWT.srt |
3,257 |
AC99C7C1 |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\03. Short-lived Access Tokens with Refresh Tokens.mp4 |
8,084,037 |
E36B6F45 |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\03. Short-lived Access Tokens with Refresh Tokens.srt |
6,171 |
56F2B7A7 |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\04. Handling Long-lived Tokens.mp4 |
8,973,422 |
DB7400DA |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\04. Handling Long-lived Tokens.srt |
6,462 |
A9CB5F76 |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\05. A Closer Look at Authentication as a Microservice.mp4 |
7,225,374 |
47BC4F9B |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\05. A Closer Look at Authentication as a Microservice.srt |
5,072 |
D11F9ADB |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\06. Securing Reactive Microservices.mp4 |
6,937,645 |
0F28806A |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\06. Securing Reactive Microservices.srt |
6,522 |
5657F5EA |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\07. Module Wrap Up.mp4 |
1,889,738 |
E1A2135B |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture\07. Module Wrap Up.srt |
1,565 |
33680F5C |
07. Monitoring and Throttling Your Microservices\01. Module Introduction.mp4 |
2,807,010 |
1E7E4A0D |
07. Monitoring and Throttling Your Microservices\01. Module Introduction.srt |
1,824 |
5FEB850E |
07. Monitoring and Throttling Your Microservices\02. Auditing Sensitive Events.mp4 |
9,853,139 |
E284F2C8 |
07. Monitoring and Throttling Your Microservices\02. Auditing Sensitive Events.srt |
9,081 |
6BCED6B3 |
07. Monitoring and Throttling Your Microservices\03. Proactively Monitoring Your Microservices.mp4 |
5,989,588 |
92A8C62D |
07. Monitoring and Throttling Your Microservices\03. Proactively Monitoring Your Microservices.srt |
5,475 |
8B4F2AE4 |
07. Monitoring and Throttling Your Microservices\04. Throttling Your Microservices.mp4 |
9,079,276 |
0C397405 |
07. Monitoring and Throttling Your Microservices\04. Throttling Your Microservices.srt |
8,076 |
035CB762 |
07. Monitoring and Throttling Your Microservices\05. Resiliency Questions You Need to Ask Yourself.mp4 |
2,876,118 |
8086B367 |
07. Monitoring and Throttling Your Microservices\05. Resiliency Questions You Need to Ask Yourself.srt |
2,429 |
102CDEBF |
07. Monitoring and Throttling Your Microservices\06. Module Wrap Up.mp4 |
1,111,810 |
1C044533 |
07. Monitoring and Throttling Your Microservices\06. Module Wrap Up.srt |
1,129 |
8601089A |
08. Decoupling Security from Your Microservices with Service Mesh\01. Module Introduction.mp4 |
5,099,327 |
9D50AE30 |
08. Decoupling Security from Your Microservices with Service Mesh\01. Module Introduction.srt |
4,334 |
FF3EB39E |
08. Decoupling Security from Your Microservices with Service Mesh\02. Service Mesh with Istio.mp4 |
8,545,923 |
20CC5C81 |
08. Decoupling Security from Your Microservices with Service Mesh\02. Service Mesh with Istio.srt |
8,095 |
31C9DCC6 |
08. Decoupling Security from Your Microservices with Service Mesh\03. Module Wrap Up.mp4 |
8,327,670 |
BA7D635A |
08. Decoupling Security from Your Microservices with Service Mesh\03. Module Wrap Up.srt |
4,681 |
3CC548BF |
09. Securely Developing and Deploying Your Microservices\01. Module Introduction.mp4 |
1,445,414 |
D0095EE8 |
09. Securely Developing and Deploying Your Microservices\01. Module Introduction.srt |
1,254 |
260CAFA6 |
09. Securely Developing and Deploying Your Microservices\02. Don't Re-invent the Wheel.mp4 |
5,396,205 |
91546B98 |
09. Securely Developing and Deploying Your Microservices\02. Don't Re-invent the Wheel.srt |
3,796 |
C61CCA65 |
09. Securely Developing and Deploying Your Microservices\03. Keep It Simple and Automate.mp4 |
1,884,410 |
E28F1862 |
09. Securely Developing and Deploying Your Microservices\03. Keep It Simple and Automate.srt |
1,779 |
AA7BD1D5 |
09. Securely Developing and Deploying Your Microservices\04. If You Do Only One Thing Then Do Patching.mp4 |
2,803,111 |
89A63652 |
09. Securely Developing and Deploying Your Microservices\04. If You Do Only One Thing Then Do Patching.srt |
2,663 |
CDEC9EF2 |
09. Securely Developing and Deploying Your Microservices\05. Obscure Everything but Don't Rely on Obscurity.mp4 |
3,191,305 |
10A4678B |
09. Securely Developing and Deploying Your Microservices\05. Obscure Everything but Don't Rely on Obscurity.srt |
3,440 |
614A10D0 |
09. Securely Developing and Deploying Your Microservices\06. Effective Secret Management.mp4 |
5,055,170 |
9535EF58 |
09. Securely Developing and Deploying Your Microservices\06. Effective Secret Management.srt |
4,064 |
97272847 |
09. Securely Developing and Deploying Your Microservices\07. Secure Your Containers.mp4 |
6,921,614 |
73AE6A41 |
09. Securely Developing and Deploying Your Microservices\07. Secure Your Containers.srt |
6,518 |
F8DAE071 |
09. Securely Developing and Deploying Your Microservices\08. Module Wrap Up.mp4 |
2,406,197 |
800E561C |
09. Securely Developing and Deploying Your Microservices\08. Module Wrap Up.srt |
2,768 |
D1C247A5 |
10. Fostering a Security Culture within Your Microservices Teams\01. Module Introduction.mp4 |
3,936,119 |
F8ECC674 |
10. Fostering a Security Culture within Your Microservices Teams\01. Module Introduction.srt |
2,591 |
7BD28DC9 |
10. Fostering a Security Culture within Your Microservices Teams\02. Visualize Your Architecture.mp4 |
4,022,220 |
78E8DA30 |
10. Fostering a Security Culture within Your Microservices Teams\02. Visualize Your Architecture.srt |
3,937 |
6A39538C |
10. Fostering a Security Culture within Your Microservices Teams\03. Threat Modeling.mp4 |
5,553,819 |
8DE51A8A |
10. Fostering a Security Culture within Your Microservices Teams\03. Threat Modeling.srt |
5,953 |
5F60C044 |
10. Fostering a Security Culture within Your Microservices Teams\04. Performing a Risk Assessment.mp4 |
7,258,323 |
CCAC1778 |
10. Fostering a Security Culture within Your Microservices Teams\04. Performing a Risk Assessment.srt |
7,620 |
8903D53D |
10. Fostering a Security Culture within Your Microservices Teams\05. Conducting Training and Code Reviews.mp4 |
2,019,567 |
2C60CB23 |
10. Fostering a Security Culture within Your Microservices Teams\05. Conducting Training and Code Reviews.srt |
1,752 |
EFCF18E1 |
10. Fostering a Security Culture within Your Microservices Teams\06. Module Wrap Up.mp4 |
3,770,655 |
6D41211C |
10. Fostering a Security Culture within Your Microservices Teams\06. Module Wrap Up.srt |
3,984 |
4CE1F917 |
Exercise Files\02\understanding-the-complexities-of-microservices-security-slides.pdf |
3,926,156 |
53446108 |
Exercise Files\03\securing-the-perimeter-around-your-microservices-slides.pdf |
2,536,615 |
AF59B4E9 |
Exercise Files\04\securing-the-communication-between-your-microservices-slides.pdf |
3,282,711 |
7B7A7628 |
Exercise Files\05\securing-the-communication-between-your-microservices-and-public-clients-slides.pdf |
1,032,837 |
57893550 |
Exercise Files\06\defense-in-depth-leveraging-security-patterns-in-your-microservices-architecture-slides.pdf |
1,505,363 |
1648FD4A |
Exercise Files\07\monitoring-and-throttling-your-microservices-slides.pdf |
3,014,634 |
4D89A96B |
Exercise Files\08\decoupling-security-from-your-microservices-with-service-mesh-slides.pdf |
938,233 |
2840FEEB |
Exercise Files\09\securely-developing-and-deploying-your-microservices-slides.pdf |
2,377,346 |
6A48A0AE |
Exercise Files\10\fostering-a-security-culture-within-your-microservices-teams-slides.pdf |
2,303,480 |
9EFBA255 |
Exercise Files\02 |
0 |
00000000 |
Exercise Files\03 |
0 |
00000000 |
Exercise Files\04 |
0 |
00000000 |
Exercise Files\05 |
0 |
00000000 |
Exercise Files\06 |
0 |
00000000 |
Exercise Files\07 |
0 |
00000000 |
Exercise Files\08 |
0 |
00000000 |
Exercise Files\09 |
0 |
00000000 |
Exercise Files\10 |
0 |
00000000 |
01. Course Overview |
0 |
00000000 |
02. Understanding the Complexities of Microservices Security |
0 |
00000000 |
03. Securing the Perimeter around Your Microservices |
0 |
00000000 |
04. Securing the Communication between Your Microservices |
0 |
00000000 |
05. Securing the Communication between Your Microservices and Public Clients |
0 |
00000000 |
06. Defense in Depth- Leveraging Security Patterns in Your Microservices Architecture |
0 |
00000000 |
07. Monitoring and Throttling Your Microservices |
0 |
00000000 |
08. Decoupling Security from Your Microservices with Service Mesh |
0 |
00000000 |
09. Securely Developing and Deploying Your Microservices |
0 |
00000000 |
10. Fostering a Security Culture within Your Microservices Teams |
0 |
00000000 |
Exercise Files |
0 |
00000000 |
|
Total size: |
420,076,666 |
|