Companies Home Search Profile

[NEW] Spring Security 6 Zero to Master along with JWT,OAUTH2

Focused View

Eazy Bytes,Madan Reddy

14:47:51

142 View
  • 001 Course Introduction.mp4
    07:32
  • 002 Details of Source Code, PDF Content & other instructions for the course.mp4
    03:59
  • 002 Spring-Security-Zero-to-Master-along-with-JWT-OAUTH2.pdf
  • 003 What is Security & Why it is important.mp4
    07:07
  • 004 Creating a simple Spring Boot app with out security.mp4
    11:44
  • 005 Securing Spring Boot basic app using Spring Security.mp4
    06:42
  • 006 Configure static credentials inside application properties file.mp4
    04:46
  • 007 Why should we use Spring Security framework.mp4
    04:34
  • 008 Quick introduction to Servlets & Filters.mp4
    05:06
  • 009 Introduction to Spring Security Internal flow.mp4
    10:24
  • 010 Demo of Spring Security internal flow.mp4
    14:24
  • 011 Sequence flow of the Spring Security default behaviour.mp4
    04:50
  • 012 Understanding on how multiple requests work with out credentials.mp4
    04:11
  • external-links.txt
  • 001 Understanding about UI part of the EazyBank application.mp4
    05:42
  • 002 Backend REST services required for EazyBank app.mp4
    03:08
  • 003 Creating backend services needed for the EazyBank application - Part 1.mp4
    07:33
  • 004 Creating backend services needed for the EazyBank application - Part 2.mp4
    05:57
  • 005 Checking the default configuration inside the spring security framework.mp4
    07:18
  • 006 IMPORTANT NOTE.html
  • 007 Modifying the code as per our custom requirements.mp4
    06:50
  • 008 Denying all the requests.mp4
    04:35
  • 009 Permit all the requests.mp4
    04:47
  • 001 Introduction to the agenda of the section.mp4
    04:18
  • 002 Configuring users using InMemoryUserDetailsManager - Approach 1.mp4
    09:37
  • 003 Configuring users using InMemoryUserDetailsManager - Approach 2.mp4
    05:23
  • 004 Understanding User Management interfaces and Classes.mp4
    08:51
  • 005 Deep Dive of UserDetails Interface & User class.mp4
    12:00
  • 006 Deep Dive of UserDetailsService & UserDetailsManager Interfaces.mp4
    04:52
  • 007 Deep Dive of UserDetailsManager Implementation classes.mp4
    12:03
  • 008 Creating MySQL Database in the cloud.mp4
    13:13
  • 009 Connecting to DB & Creating Users inside the DB as per JdbcUserDetailsManager.mp4
    08:35
  • 010 Using JdbcUserDetailsManager to perform authentication.mp4
    11:18
  • 011 Creating our own custom tables for Authentication.mp4
    05:02
  • 012 Creating JPA Entity and repository classes for new table.mp4
    08:55
  • 013 Creating our own custom implementation of UserDetailsService.mp4
    09:54
  • 014 Building a new REST API to allow the registration of new User.mp4
    13:55
  • 001 How our passwords validated in Spring Security by default.mp4
    08:45
  • 002 Encoding Vs Encryption Vs Hashing - Part 1.mp4
    06:34
  • 003 Encoding Vs Encryption Vs Hashing - Part 2.mp4
    10:07
  • 004 How Our passwords will be validated with hashing & PasswordEncoders.mp4
    03:01
  • 005 Deep dive of PasswordEncoder interface.mp4
    04:48
  • 006 Deep dive of PasswordEncoder implementation classes - Part 1.mp4
    09:05
  • 007 Deep dive of PasswordEncoder implementation classes - Part 2.mp4
    06:16
  • 008 Demo of registration of new user with Bcrypt password encoder.mp4
    07:56
  • 009 Demo of login with Bcrypt password encoder.mp4
    09:44
  • 001 Why should we consider creating our own AuthenticationProvider.mp4
    04:32
  • 002 Understanding AuthenticationProvider methods.mp4
    07:10
  • 003 Implementing and Customising the AuthenticationProvider inside our application.mp4
    08:15
  • 004 Testing our custom AuthenticationProvider implementation.mp4
    05:29
  • 005 Spring Security Sequence flow with custom AuthenticationProvider.mp4
    02:37
  • 001 Setting up the EazyBank UI project.mp4
    09:42
  • 002 Understanding the UI project and walkthrough of the Angular code.mp4
    13:33
  • 003 Creating new DB schema for EazyBank scenarios.mp4
    09:42
  • 004 Updating Backend project based on the latest DB schema.mp4
    09:30
  • 005 Testing registration of the new user with latest changes.mp4
    03:53
  • 006 Taste of CORs error.mp4
    05:42
  • 007 Introduction to CORs.mp4
    03:53
  • 008 Possible options to fix the CORs issue.mp4
    05:50
  • 009 Fixing CORs issue using Spring Security.mp4
    07:17
  • 010 Demo of default CSRF protection inside Spring Security.mp4
    05:33
  • 011 Introduction to CSRF attack.mp4
    05:26
  • 012 Solution to handle CSRF attacks.mp4
    05:56
  • 013 Ignoring CSRF protection for public APIs.mp4
    05:11
  • 014 Implementing CSRF token solution inside our web application.mp4
    20:23
  • 015 Testing the CSRF related changes.mp4
    09:46
  • 001 Authentication Vs Authorization.mp4
    05:57
  • 002 How Authorities stored inside Spring Security.mp4
    07:10
  • 003 Creating new table authorities to store multiple roles or authorities.mp4
    05:32
  • 004 Making backend changes to load authorities from new DB table.mp4
    09:38
  • 005 Configuring Authorities inside web application using Spring Security-Theory.mp4
    03:14
  • 006 Configuring Authorities inside web application using Spring Security - Coding.mp4
    06:31
  • 007 Authority Vs Role in Spring Security.mp4
    04:06
  • 008 Configuring Roles Authorization inside web app using Spring Security-Theory.mp4
    02:38
  • 009 Configuring Roles Authorization inside web app using Spring Security-Coding.mp4
    05:30
  • 001 Introduction to Filters in Spring Security and the sample use cases.mp4
    04:56
  • 002 Demo of Inbuilt Filters of Spring Security framework.mp4
    07:29
  • 003 How to create our own custom filter.mp4
    04:20
  • 004 Adding a custom filter using addFilterBefore() method.mp4
    08:54
  • 005 Adding a custom filter using addFilterAfter() method.mp4
    05:53
  • 006 Adding a custom filter using addFilterAt() method.mp4
    05:34
  • 007 Details about GenericFilterBean and OncePerRequestFilter.mp4
    07:01
  • 001 Demo of JSESSIONID and issues with it.mp4
    03:44
  • 002 Advantages of Token based Authentication.mp4
    08:21
  • 003 Deep dive about JWT Tokens - Part 1.mp4
    06:30
  • 004 Deep dive about JWT Tokens - Part 2.mp4
    08:50
  • 005 Making project configuration to use JWT tokens.mp4
    06:15
  • 006 Configuring filters to generate the JWT tokens.mp4
    08:27
  • 007 Configuring filters to validate JWT tokens.mp4
    08:16
  • 008 Making changes on the client side for JWT token based authentication.mp4
    02:54
  • 009 Validating the JWT changes made by running the applications.mp4
    05:41
  • 010 Validating the JWT token expiration scenario.mp4
    02:58
  • 001 Introduction to method level security in Spring Security.mp4
    05:44
  • 002 Details about method invocation authorization in method level security.mp4
    08:22
  • 003 Demo of method level security using @PreAuthorize.mp4
    05:50
  • 004 Demo of method level security using @PostAuthorize.mp4
    03:27
  • 005 Details about filtering authorization in method level security.mp4
    03:37
  • 006 Demo of @PreFilter annotation.mp4
    07:45
  • 007 Demo of @PostFilter annotation.mp4
    04:19
  • 001 Problems that OAUTH2 trying to solve.mp4
    11:03
  • 002 Introduction to OAUTH2.mp4
    06:30
  • 003 OAuth2 terminologies or jargons.mp4
    04:54
  • 004 OAuth2 Sample flow - Theory.mp4
    06:04
  • 005 Demo of OAuth2 Sample flow.mp4
    06:35
  • 006 Deep dive on Authorization code grant type flow in OAUTH2.mp4
    09:36
  • 007 Demo of Authorization code grant type flow in OAUTH2.mp4
    05:50
  • 008 Deep dive & Demo of implicit grant flow in OAUTH2.mp4
    05:24
  • 009 Deep dive of password grant type flow in OAUTH2.mp4
    04:23
  • 010 Deep dive of client credentials grant type flow in OAUTH2.mp4
    03:31
  • 011 Deep dive of refresh token grant type flow in OAUTH2.mp4
    06:18
  • 012 How resource server validates the tokens issued by Auth server.mp4
    02:54
  • 013 Introduction to OpenID Connect.mp4
    10:21
  • 001 Registering the client details with the GitHub to use its OAUTH2 Auth server.mp4
    04:56
  • 002 Building a springboot application that uses GitHub Auth server during OAuth2.mp4
    07:41
  • 003 Running and verifying the sample application using GitHub OAUTH2.mp4
    04:40
  • 001 Introduction to OAUTH2 flow inside EazyBank web App.mp4
    02:21
  • 002 Introduction to KeyCloak Auth Server.mp4
    04:42
  • 003 Installation of KeyCloak server & setup admin account.mp4
    04:21
  • 004 Setup a Realm inside KeyCloak Server for EazyBank App.mp4
    02:00
  • 005 Creating Client Credentials inside KeyCloak for API-API secured invocations.mp4
    04:47
  • 006 Setup of EazyBank Resource Server.mp4
    14:19
  • 007 Getting Access token from KeyCloak using client credentials grant type.mp4
    07:54
  • 008 Passing Access token to Resource server for response through Postman.mp4
    04:57
  • 009 Understanding Authorization code grant type for EazyBank App.mp4
    02:42
  • 010 Creating Client and User details inside KeyCloak for Auth code grant flow.mp4
    03:57
  • 011 Testing Authorization code grant type using Postman App.mp4
    09:03
  • 012 Deep dive on Authorization code grant type with PKCE.mp4
    09:27
  • 013 Demo of Authorization code grant type with PKCE.mp4
    06:28
  • 014 Creating public facing client details inside KeyCloak server.mp4
    03:07
  • 015 Implementing PKCE Authorization code grant type inside Angular UI App - Part 1.mp4
    08:31
  • 016 Implementing PKCE Authorization code grant type inside Angular UI App - Part 2.mp4
    08:01
  • 017 Testing PKCE flow inside Eazy Bank application.mp4
    05:51
  • 018 Important features of KeyCloak.mp4
    07:36
  • 019 Social Login integration with the help of KeyCloak Server.mp4
    05:27
  • 001 Thank You and Congratulations.mp4
    01:36
  • 002 Bonus lectures.html
  • Description


    Spring Security 6 , SpringBoot 3 Security, CORs, CSRF, JWT, OAUTH2, OpenID Connect, KeyCloak

    What You'll Learn?


    • Spring Security framework details and it features.
    • How to adapt security for a Java web application using Spring Security
    • What is CSRF, CORS, JWT, OAUTH2
    • Applying authorization rules using roles, authorities inside a web application using Spring Security
    • Method level security in web/non-web applications

    Who is this for?


  • Beginner students who are learning Spring framework and interested in security as well
  • Developers who already know developing web applications using Spring framework
  • Java Architects
  • What You Need to Know?


  • Java
  • Basics of Spring framework
  • More details


    Description

    'Spring Security Zero to Master' course will help in understanding the Spring Security Architecture, important packages, interfaces, classes inside it which handles authentication and authorization requests in the web applications. It also covers most common security related topics like CORs, CSRF, JWT, OAUTH2, password management, method level security, user, roles & authorities management inside web applications.

    Below are the important topics that this course covers,

    1. Spring Security framework details and it features

    2. How to adapt security for a Java web application using Spring Security

    3. Password Management in Spring Security with PasswordEncoders

    4. Deep dive about encoding, encryption and hashing

    5. What is CSRF, CORS and how to address them

    6. What is Authentication and Authorization. How they are different from each other.

    7. Securing endpoint URLs inside web applications using Ant, MVC & Regex Matchers

    8. Filters in Spring Security and how to write own custom filters

    9. Deep dive about JWT (JSON Web Tokens) and the role of them inside Authentication & Authorization

    10. Deep dive about OAUTH2 and various grant type flows inside OAUTH2.

    11. Deep dive about OpenID Connect & how it is related to OAUTH2

    12. Applying authorization rules using roles, authorities inside a web application using Spring Security

    13. Method level security in web/non-web applications

    14. Social Login integrations into web applications

    15. Set up of Authorization Server using KeyCloak


    The pre-requisite for the course is basic knowledge of Java, Spring and interest to learn.

    Who this course is for:

    • Beginner students who are learning Spring framework and interested in security as well
    • Developers who already know developing web applications using Spring framework
    • Java Architects

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    The target of the Eazy Bytes is to educate Students, Developers and Architects on designing and implementing web applications focusing modularity, scalability, security and performance by using Java, Angular, Spring, JPA, Hibernate, Microservices, SpringBoot and Cloud. As the name indicates the knowledge sharing will be in byte sized which can be easily understand by anyone who spends quality time during the trainings.
    Madan Reddy is the founder of eazybytes, who boasts over 13 years of experience creating and distributing enterprise web applications using Java, Spring, SpringBoot, Microservices, Angular, React JS & Cloud. He is consistently enthusiastic about staying current and imparting his knowledge with others. With his remarkable talent for simplifying complex concepts, he has been able to instruct novice software developers for many years, and has recently extended his knowledge to Udemy, where he has created top-rated courses. Through his teachings on Udemy, he intends to impart the knowledge he has acquired to other software engineers and college students.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 132
    • duration 14:47:51
    • English subtitles has
    • Release Date 2023/07/31

    Courses related to Spring Boot

    Courses related to Spring Framework

    Courses related to CISSP - Certified Information Systems Security Professional

    Courses related to Cyber Security

    Courses related to Network Security

    Subtitle
    Initial Access with Luckystrike
    Subtitle
    Specialized Testing: Deserialization

    Courses related to Information Security

    Courses related to Cyber Security Awareness