Companies Home Search Profile

Microservices Security in Action

Focused View

20:59:38

64 View
  • 00001 Part 1. Overview.mp4
    01:16
  • 00002 Chapter 1. Microservices security landscape.mp4
    10:11
  • 00003 Chapter 1 Challenges of securing microservices.mp4
    09:58
  • 00004 Chapter 1 Immutability of containers challenges how you maintain service credentials and access-control policies.mp4
    08:06
  • 00005 Chapter 1 Key security fundamentals.mp4
    09:35
  • 00006 Chapter 1 Confidentiality protects your systems from unintended information disclosure.mp4
    10:27
  • 00007 Chapter 1 Edge security.mp4
    12:33
  • 00008 Chapter 1 Securing service-to-service communication.mp4
    06:32
  • 00009 Chapter 1 Service-level authorization.mp4
    05:34
  • 00010 Chapter 1 Crossing trust boundaries.mp4
    08:26
  • 00011 Chapter 2 First steps in securing microservices.mp4
    09:53
  • 00012 Chapter 2 Accessing the Order Processing microservice.mp4
    07:29
  • 00013 Chapter 2 Setting up an OAuth 2.0 server.mp4
    07:42
  • 00014 Chapter 2 Getting an access token from the OAuth 2.0 authorization server.mp4
    06:12
  • 00015 Chapter 2 Securing a microservice with OAuth 2.0.mp4
    08:10
  • 00016 Chapter 2 Invoking a secured microservice from a client application.mp4
    12:29
  • 00017 Part 2. Edge security.mp4
    02:25
  • 00018 Chapter 3 Securing north south traffic with an API gateway.mp4
    05:07
  • 00019 Chapter 3 Decoupling security from the microservice.mp4
    08:47
  • 00020 Chapter 3 Security at the edge.mp4
    06:58
  • 00021 Chapter 3 Why not basic authentication to secure APIs.mp4
    06:58
  • 00022 Chapter 3 Setting up an API gateway with Zuul.mp4
    05:34
  • 00023 Chapter 3 Enforcing OAuth 2.0-based security at the Zuul gateway Pt 1.mp4
    11:25
  • 00024 Chapter 3 Enforcing OAuth 2.0-based security at the Zuul gateway Pt 2.mp4
    10:20
  • 00025 Chapter 3 Securing communication between Zuul and the microservice.mp4
    07:19
  • 00026 Chapter 4 Accessing a secured microservice via a single-page application.mp4
    06:39
  • 00028 Chapter 4 Setting up cross-origin resource sharing.mp4
    10:27
  • 00029 Chapter 4 Inspecting the source that allows cross-origin requests.mp4
    06:38
  • 00030 Chapter 4 Securing a SPA with OpenID Connect.mp4
    09:31
  • 00031 Chapter 4 Inspecting the code of the applications.mp4
    04:52
  • 00032 Chapter 4 Using federated authentication.mp4
    10:21
  • 00033 Chapter 5 Engaging throttling monitoring and access control.mp4
    08:46
  • 00034 Chapter 5 Fair usage policy for users.mp4
    09:28
  • 00035 Chapter 5 Maximum handling capacity of a microservice.mp4
    10:23
  • 00036 Chapter 5 Monitoring and analytics with Prometheus and Grafana.mp4
    13:34
  • 00037 Chapter 5 Enforcing access-control policies at the API gateway with Open Policy Agent.mp4
    08:09
  • 00038 Chapter 5 Evaluating OPA policies.mp4
    06:06
  • 00039 Part 3. Service-to-service communications.mp4
    01:43
  • 00040 Chapter 6 Securing east west traffic with certificates.mp4
    07:13
  • 00041 Chapter 6 Creating certificates to secure access to microservices.mp4
    07:26
  • 00042 Chapter 6 Securing microservices with TLS.mp4
    12:57
  • 00043 Chapter 6 Engaging mTLS.mp4
    11:09
  • 00044 Chapter 6 Certificate revocation Pt 1.mp4
    08:03
  • 00045 Chapter 6 Certificate revocation Pt 2.mp4
    07:10
  • 00046 Chapter 6 Key rotation.mp4
    08:04
  • 00047 Chapter 7 Securing east west traffic with JWT.mp4
    07:07
  • 00048 Chapter 7 Sharing user context with a new JWT for each service-to-service interaction.mp4
    06:38
  • 00049 Chapter 7 Self-issued JWTs.mp4
    05:21
  • 00050 Chapter 7 Setting up an STS to issue a JWT.mp4
    06:19
  • 00051 Chapter 7 Using JWT as a data source for access control.mp4
    05:06
  • 00052 Chapter 7 Exchanging a JWT for a new one with a new audience.mp4
    06:35
  • 00053 Chapter 8 Securing east west traffic over gRPC.mp4
    12:15
  • 00054 Chapter 8 Securing gRPC service-to-service communications with mTLS.mp4
    11:39
  • 00055 Chapter 8 Securing gRPC service-to-service communications with JWT.mp4
    09:36
  • 00056 Chapter 9 Securing reactive microservices.mp4
    12:07
  • 00057 Chapter 9 Setting up Kafka as a message broker.mp4
    05:43
  • 00058 Chapter 9 Developing a microservice to push events to a Kafka topic.mp4
    08:48
  • 00059 Chapter 9 Using TLS to protect data in transit.mp4
    05:31
  • 00060 Chapter 9 Configuring TLS on the microservices.mp4
    06:23
  • 00061 Chapter 9 Using mTLS for authentication.mp4
    06:38
  • 00062 Chapter 9 Controlling access to Kafka topics with ACLs.mp4
    11:18
  • 00063 Chapter 9 Setting up NATS as a message broker.mp4
    07:46
  • 00064 Part 4. Secure deployment.mp4
    01:36
  • 00065 Chapter 10 Conquering container security with Docker.mp4
    05:54
  • 00066 Chapter 10 Managing secrets in a Docker container.mp4
    10:54
  • 00067 Chapter 10 Using Docker Content Trust to sign and verify Docker images.mp4
    08:34
  • 00068 Chapter 10 Signature verification with DCT.mp4
    07:51
  • 00069 Chapter 10 Running the Order Processing microservice on Docker.mp4
    05:25
  • 00070 Chapter 10 Running containers with limited privileges.mp4
    10:43
  • 00071 Chapter 10 Running Docker Bench for security.mp4
    07:52
  • 00072 Chapter 10 Enabling mTLS at the NGINX server to secure access to Docker APIs Pt 1.mp4
    08:17
  • 00073 Chapter 10 Enabling mTLS at the NGINX server to secure access to Docker APIs Pt 2.mp4
    06:31
  • 00074 Chapter 11 Securing microservices on Kubernetes.mp4
    11:18
  • 00075 Chapter 11 Managing secrets in a Kubernetes environment.mp4
    07:51
  • 00076 Chapter 11 Defining a ConfigMap for keystore credentials.mp4
    08:11
  • 00077 Chapter 11 Using Kubernetes Secrets.mp4
    07:14
  • 00078 Chapter 11 Running the Order Processing microservice in Kubernetes.mp4
    07:59
  • 00079 Chapter 11 Running the Inventory microservice in Kubernetes.mp4
    09:57
  • 00080 Chapter 11 Using role-based access control in Kubernetes.mp4
    11:58
  • 00081 Chapter 12 Securing microservices with Istio service mesh.mp4
    06:07
  • 00082 Chapter 12 Clean up any previous work.mp4
    07:09
  • 00083 Chapter 12 Enabling TLS termination at the Istio Ingress gateway.mp4
    13:03
  • 00084 Chapter 12 Deploying VirtualServices.mp4
    09:57
  • 00085 Chapter 12 Securing service-to-service communications with mTLS.mp4
    09:58
  • 00086 Chapter 12 Peer authentication and request authentication.mp4
    09:53
  • 00087 Chapter 12 Enforcing authorization.mp4
    06:07
  • 00088 Chapter 12 Testing end-to-end flow with RBAC.mp4
    08:17
  • 00089 Chapter 12 Managing keys in Istio.mp4
    06:02
  • 00090 Chapter 12 Key provisioning and rotation with SDS.mp4
    07:12
  • 00091 Part 5. Secure development.mp4
    00:32
  • 00092 Chapter 13 Secure coding practices and automation.mp4
    07:06
  • 00093 Chapter 13 Broken authentication.mp4
    06:11
  • 00094 Chapter 13 Lack of resources and rate limiting.mp4
    05:46
  • 00095 Chapter 13 Security misconfiguration.mp4
    07:15
  • 00096 Chapter 13 Running static code analysis.mp4
    09:11
  • 00097 Chapter 13 Integrating security testing with Jenkins.mp4
    07:08
  • 00098 Chapter 13 Setting up a build pipeline with Jenkins.mp4
    06:08
  • 00099 Chapter 13 Running dynamic analysis with OWASP ZAP.mp4
    15:12
  • 00100 Appendix A OAuth 2.0 and OpenID Connect.mp4
    08:20
  • 00101 Appendix A Actors of an OAuth 2.0 flow.mp4
    05:41
  • 00102 Appendix A Grant types.mp4
    07:31
  • 00103 Appendix A Resource owner password grant type.mp4
    07:39
  • 00104 Appendix A Authorization code grant type.mp4
    08:32
  • 00105 Appendix A Implicit grant type.mp4
    05:05
  • 00106 Appendix A Scopes bind capabilities to an OAuth 2.0 access token.mp4
    09:36
  • 00107 Appendix B JSON Web Token.mp4
    05:19
  • 00108 Appendix B What does a JWT look like.mp4
    07:47
  • 00109 Appendix B JSON Web Signature.mp4
    09:07
  • 00110 Appendix C Single-page application architecture.mp4
    08:11
  • 00111 Appendix D Observability in a microservices deployment.mp4
    06:05
  • 00112 Appendix D The importance of tracing in observability.mp4
    11:45
  • 00113 Appendix E Docker Swarm.mp4
    11:13
  • 00114 Appendix E Docker fundamentals.mp4
    05:10
  • 00115 Appendix E Docker adding value to Linux containers.mp4
    06:21
  • 00116 Appendix E Installing Docker.mp4
    05:27
  • 00117 Appendix E Containerizing an application.mp4
    08:55
  • 00118 Appendix E Container name and container ID.mp4
    07:04
  • 00119 Appendix E Image name and image ID.mp4
    10:11
  • 00120 Appendix E Image layers.mp4
    10:11
  • 00121 Appendix E Deleting an image.mp4
    08:23
  • 00122 Appendix E Docker internal architecture.mp4
    10:06
  • 00123 Appendix E What is happening behind the scenes of docker run.mp4
    08:29
  • 00124 Appendix F Open Policy Agent.mp4
    09:57
  • 00125 Appendix F Deploying OPA as a Docker container.mp4
    13:20
  • 00126 Appendix F External data.mp4
    08:34
  • 00127 Appendix F JSON Web Token.mp4
    06:10
  • 00128 Appendix F OPA integrations.mp4
    08:21
  • 00129 Appendix G Creating a certificate authority and related keys with OpenSSL.mp4
    09:34
  • 00130 Appendix H Secure Production Identity Framework for Everyone.mp4
    08:46
  • 00131 Appendix H The inspiration behind SPIFFE.mp4
    06:44
  • 00132 Appendix H How SPIRE works.mp4
    13:36
  • 00133 Appendix H SPIFFE Verifiable Identity Document.mp4
    11:34
  • 00134 Appendix I gRPC fundamentals.mp4
    11:04
  • 00135 Appendix I Understanding HTTP 2 and its benefits over HTTP 1.x.mp4
    13:32
  • 00136 Appendix I The different types of RPC available in gRPC.mp4
    05:58
  • 00137 Appendix J Kubernetes fundamentals.mp4
    08:22
  • 00138 Appendix J A Service - an abstraction over Kubernetes Pods.mp4
    13:25
  • 00139 Appendix J Getting started with Minikube and Docker Desktop.mp4
    09:07
  • 00140 Appendix J Creating a Kubernetes Deployment.mp4
    08:39
  • 00141 Appendix J Behind the scenes of a Service.mp4
    13:01
  • 00142 Appendix J Exploring the Kubernetes API server.mp4
    05:18
  • 00143 Appendix J Kubernetes internal communication.mp4
    12:22
  • 00144 Appendix J Managing configurations.mp4
    06:21
  • 00145 Appendix K Service mesh and Istio fundamentals.mp4
    05:51
  • 00146 Appendix K The Service Mesh architecture.mp4
    09:24
  • 00147 Appendix K Istio architecture.mp4
    09:56
  • 00148 Appendix K Istio data plane.mp4
    09:45
  • 00149 Appendix K Setting up Istio service mesh on Kubernetes.mp4
    05:56
  • 00150 Appendix K What Istio brings to a Kubernetes cluster.mp4
    11:31
  • 00151 Appendix K Setting up the Kubernetes deployment.mp4
    10:32
  • 00152 Appendix K Updating the Order Processing microservice with Istio configurations.mp4
    11:36
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Manning Publications is an American publisher specializing in content relating to computers. Manning mainly publishes textbooks but also release videos and projects for professionals within the computing world.
    • language english
    • Training sessions 151
    • duration 20:59:38
    • Release Date 2023/11/06