Microservices Security in Action
Focused View
20:59:38
64 View
00001 Part 1. Overview.mp4
01:16
00002 Chapter 1. Microservices security landscape.mp4
10:11
00003 Chapter 1 Challenges of securing microservices.mp4
09:58
00004 Chapter 1 Immutability of containers challenges how you maintain service credentials and access-control policies.mp4
08:06
00005 Chapter 1 Key security fundamentals.mp4
09:35
00006 Chapter 1 Confidentiality protects your systems from unintended information disclosure.mp4
10:27
00007 Chapter 1 Edge security.mp4
12:33
00008 Chapter 1 Securing service-to-service communication.mp4
06:32
00009 Chapter 1 Service-level authorization.mp4
05:34
00010 Chapter 1 Crossing trust boundaries.mp4
08:26
00011 Chapter 2 First steps in securing microservices.mp4
09:53
00012 Chapter 2 Accessing the Order Processing microservice.mp4
07:29
00013 Chapter 2 Setting up an OAuth 2.0 server.mp4
07:42
00014 Chapter 2 Getting an access token from the OAuth 2.0 authorization server.mp4
06:12
00015 Chapter 2 Securing a microservice with OAuth 2.0.mp4
08:10
00016 Chapter 2 Invoking a secured microservice from a client application.mp4
12:29
00017 Part 2. Edge security.mp4
02:25
00018 Chapter 3 Securing north south traffic with an API gateway.mp4
05:07
00019 Chapter 3 Decoupling security from the microservice.mp4
08:47
00020 Chapter 3 Security at the edge.mp4
06:58
00021 Chapter 3 Why not basic authentication to secure APIs.mp4
06:58
00022 Chapter 3 Setting up an API gateway with Zuul.mp4
05:34
00023 Chapter 3 Enforcing OAuth 2.0-based security at the Zuul gateway Pt 1.mp4
11:25
00024 Chapter 3 Enforcing OAuth 2.0-based security at the Zuul gateway Pt 2.mp4
10:20
00025 Chapter 3 Securing communication between Zuul and the microservice.mp4
07:19
00026 Chapter 4 Accessing a secured microservice via a single-page application.mp4
06:39
00028 Chapter 4 Setting up cross-origin resource sharing.mp4
10:27
00029 Chapter 4 Inspecting the source that allows cross-origin requests.mp4
06:38
00030 Chapter 4 Securing a SPA with OpenID Connect.mp4
09:31
00031 Chapter 4 Inspecting the code of the applications.mp4
04:52
00032 Chapter 4 Using federated authentication.mp4
10:21
00033 Chapter 5 Engaging throttling monitoring and access control.mp4
08:46
00034 Chapter 5 Fair usage policy for users.mp4
09:28
00035 Chapter 5 Maximum handling capacity of a microservice.mp4
10:23
00036 Chapter 5 Monitoring and analytics with Prometheus and Grafana.mp4
13:34
00037 Chapter 5 Enforcing access-control policies at the API gateway with Open Policy Agent.mp4
08:09
00038 Chapter 5 Evaluating OPA policies.mp4
06:06
00039 Part 3. Service-to-service communications.mp4
01:43
00040 Chapter 6 Securing east west traffic with certificates.mp4
07:13
00041 Chapter 6 Creating certificates to secure access to microservices.mp4
07:26
00042 Chapter 6 Securing microservices with TLS.mp4
12:57
00043 Chapter 6 Engaging mTLS.mp4
11:09
00044 Chapter 6 Certificate revocation Pt 1.mp4
08:03
00045 Chapter 6 Certificate revocation Pt 2.mp4
07:10
00046 Chapter 6 Key rotation.mp4
08:04
00047 Chapter 7 Securing east west traffic with JWT.mp4
07:07
00048 Chapter 7 Sharing user context with a new JWT for each service-to-service interaction.mp4
06:38
00049 Chapter 7 Self-issued JWTs.mp4
05:21
00050 Chapter 7 Setting up an STS to issue a JWT.mp4
06:19
00051 Chapter 7 Using JWT as a data source for access control.mp4
05:06
00052 Chapter 7 Exchanging a JWT for a new one with a new audience.mp4
06:35
00053 Chapter 8 Securing east west traffic over gRPC.mp4
12:15
00054 Chapter 8 Securing gRPC service-to-service communications with mTLS.mp4
11:39
00055 Chapter 8 Securing gRPC service-to-service communications with JWT.mp4
09:36
00056 Chapter 9 Securing reactive microservices.mp4
12:07
00057 Chapter 9 Setting up Kafka as a message broker.mp4
05:43
00058 Chapter 9 Developing a microservice to push events to a Kafka topic.mp4
08:48
00059 Chapter 9 Using TLS to protect data in transit.mp4
05:31
00060 Chapter 9 Configuring TLS on the microservices.mp4
06:23
00061 Chapter 9 Using mTLS for authentication.mp4
06:38
00062 Chapter 9 Controlling access to Kafka topics with ACLs.mp4
11:18
00063 Chapter 9 Setting up NATS as a message broker.mp4
07:46
00064 Part 4. Secure deployment.mp4
01:36
00065 Chapter 10 Conquering container security with Docker.mp4
05:54
00066 Chapter 10 Managing secrets in a Docker container.mp4
10:54
00067 Chapter 10 Using Docker Content Trust to sign and verify Docker images.mp4
08:34
00068 Chapter 10 Signature verification with DCT.mp4
07:51
00069 Chapter 10 Running the Order Processing microservice on Docker.mp4
05:25
00070 Chapter 10 Running containers with limited privileges.mp4
10:43
00071 Chapter 10 Running Docker Bench for security.mp4
07:52
00072 Chapter 10 Enabling mTLS at the NGINX server to secure access to Docker APIs Pt 1.mp4
08:17
00073 Chapter 10 Enabling mTLS at the NGINX server to secure access to Docker APIs Pt 2.mp4
06:31
00074 Chapter 11 Securing microservices on Kubernetes.mp4
11:18
00075 Chapter 11 Managing secrets in a Kubernetes environment.mp4
07:51
00076 Chapter 11 Defining a ConfigMap for keystore credentials.mp4
08:11
00077 Chapter 11 Using Kubernetes Secrets.mp4
07:14
00078 Chapter 11 Running the Order Processing microservice in Kubernetes.mp4
07:59
00079 Chapter 11 Running the Inventory microservice in Kubernetes.mp4
09:57
00080 Chapter 11 Using role-based access control in Kubernetes.mp4
11:58
00081 Chapter 12 Securing microservices with Istio service mesh.mp4
06:07
00082 Chapter 12 Clean up any previous work.mp4
07:09
00083 Chapter 12 Enabling TLS termination at the Istio Ingress gateway.mp4
13:03
00084 Chapter 12 Deploying VirtualServices.mp4
09:57
00085 Chapter 12 Securing service-to-service communications with mTLS.mp4
09:58
00086 Chapter 12 Peer authentication and request authentication.mp4
09:53
00087 Chapter 12 Enforcing authorization.mp4
06:07
00088 Chapter 12 Testing end-to-end flow with RBAC.mp4
08:17
00089 Chapter 12 Managing keys in Istio.mp4
06:02
00090 Chapter 12 Key provisioning and rotation with SDS.mp4
07:12
00091 Part 5. Secure development.mp4
00:32
00092 Chapter 13 Secure coding practices and automation.mp4
07:06
00093 Chapter 13 Broken authentication.mp4
06:11
00094 Chapter 13 Lack of resources and rate limiting.mp4
05:46
00095 Chapter 13 Security misconfiguration.mp4
07:15
00096 Chapter 13 Running static code analysis.mp4
09:11
00097 Chapter 13 Integrating security testing with Jenkins.mp4
07:08
00098 Chapter 13 Setting up a build pipeline with Jenkins.mp4
06:08
00099 Chapter 13 Running dynamic analysis with OWASP ZAP.mp4
15:12
00100 Appendix A OAuth 2.0 and OpenID Connect.mp4
08:20
00101 Appendix A Actors of an OAuth 2.0 flow.mp4
05:41
00102 Appendix A Grant types.mp4
07:31
00103 Appendix A Resource owner password grant type.mp4
07:39
00104 Appendix A Authorization code grant type.mp4
08:32
00105 Appendix A Implicit grant type.mp4
05:05
00106 Appendix A Scopes bind capabilities to an OAuth 2.0 access token.mp4
09:36
00107 Appendix B JSON Web Token.mp4
05:19
00108 Appendix B What does a JWT look like.mp4
07:47
00109 Appendix B JSON Web Signature.mp4
09:07
00110 Appendix C Single-page application architecture.mp4
08:11
00111 Appendix D Observability in a microservices deployment.mp4
06:05
00112 Appendix D The importance of tracing in observability.mp4
11:45
00113 Appendix E Docker Swarm.mp4
11:13
00114 Appendix E Docker fundamentals.mp4
05:10
00115 Appendix E Docker adding value to Linux containers.mp4
06:21
00116 Appendix E Installing Docker.mp4
05:27
00117 Appendix E Containerizing an application.mp4
08:55
00118 Appendix E Container name and container ID.mp4
07:04
00119 Appendix E Image name and image ID.mp4
10:11
00120 Appendix E Image layers.mp4
10:11
00121 Appendix E Deleting an image.mp4
08:23
00122 Appendix E Docker internal architecture.mp4
10:06
00123 Appendix E What is happening behind the scenes of docker run.mp4
08:29
00124 Appendix F Open Policy Agent.mp4
09:57
00125 Appendix F Deploying OPA as a Docker container.mp4
13:20
00126 Appendix F External data.mp4
08:34
00127 Appendix F JSON Web Token.mp4
06:10
00128 Appendix F OPA integrations.mp4
08:21
00129 Appendix G Creating a certificate authority and related keys with OpenSSL.mp4
09:34
00130 Appendix H Secure Production Identity Framework for Everyone.mp4
08:46
00131 Appendix H The inspiration behind SPIFFE.mp4
06:44
00132 Appendix H How SPIRE works.mp4
13:36
00133 Appendix H SPIFFE Verifiable Identity Document.mp4
11:34
00134 Appendix I gRPC fundamentals.mp4
11:04
00135 Appendix I Understanding HTTP 2 and its benefits over HTTP 1.x.mp4
13:32
00136 Appendix I The different types of RPC available in gRPC.mp4
05:58
00137 Appendix J Kubernetes fundamentals.mp4
08:22
00138 Appendix J A Service - an abstraction over Kubernetes Pods.mp4
13:25
00139 Appendix J Getting started with Minikube and Docker Desktop.mp4
09:07
00140 Appendix J Creating a Kubernetes Deployment.mp4
08:39
00141 Appendix J Behind the scenes of a Service.mp4
13:01
00142 Appendix J Exploring the Kubernetes API server.mp4
05:18
00143 Appendix J Kubernetes internal communication.mp4
12:22
00144 Appendix J Managing configurations.mp4
06:21
00145 Appendix K Service mesh and Istio fundamentals.mp4
05:51
00146 Appendix K The Service Mesh architecture.mp4
09:24
00147 Appendix K Istio architecture.mp4
09:56
00148 Appendix K Istio data plane.mp4
09:45
00149 Appendix K Setting up Istio service mesh on Kubernetes.mp4
05:56
00150 Appendix K What Istio brings to a Kubernetes cluster.mp4
11:31
00151 Appendix K Setting up the Kubernetes deployment.mp4
10:32
00152 Appendix K Updating the Order Processing microservice with Istio configurations.mp4
11:36
More details
User Reviews
Rating
average 0
Focused display
Category

Manning Publications
View courses Manning PublicationsManning Publications is an American publisher specializing in content relating to computers. Manning mainly publishes textbooks but also release videos and projects for professionals within the computing world.
- language english
- Training sessions 151
- duration 20:59:38
- Release Date 2023/11/06