Java Spring Cloud: Securing Microservices

Spring Cloud Finchley.M5    |    Intermediate
  • 13 videos | 58m 20s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 67 users Rating 4.3 of 67 users (67)
Explore the concepts and tasks involved in securing microservices. This course teaches you the standard approach and principles that drive DevOps security, including application-level security of microservices. You will begin by learning how to enable secure service-to-service communication with microservices. Next you will examine the role of JSON Web Token (JWT) in a security implementation. Then learn about the techniques to validate JWT in a security implementation. As you progress further through the course, you will walk through the steps of TLS mutual authentication, and identify various types of certificate revocation as well as methods to apply short-lived certificates to enhance security. Finally, learn about edge security and how to secure microservices.

WHAT YOU WILL LEARN

  • Describe the standard approach to securing microservices
    List the principles driving security with devops
    Specify the application level security of microservices
    Enable secure service-to-service communication with microservices
    Describe the role of json jwt in a security implementation
    Validate jwt in a security implementation
    Demonstrate the process of identifying the user
  • Illustrate the steps of tls mutual authentication
    Identify the various types of certificate revocation
    Describe the approach of using short-lived certificates
    Describe edge security and demonstrate the implementation of edge security
    List and describe the security considerations to secure microservices
    identify and perform basic security

IN THIS COURSE

  • 5m 43s
    Upon completion of this video, you will be able to describe the standard approach to securing microservices. FREE ACCESS
  • 6m 26s
    After completing this video, you will be able to list the principles driving security with DevOps. FREE ACCESS
  • Locked
    3.  Application Level Security
    4m 37s
    Upon completion of this video, you will be able to specify the application-level security of microservices. FREE ACCESS
  • Locked
    4.  Securing Service-to-Service Communication
    2m 29s
    During this video, you will learn how to enable secure communication between microservices. FREE ACCESS
  • Locked
    5.  JSON Web Token (JWT)
    5m 23s
    Upon completion of this video, you will be able to describe the role of JSON Web Token in a security implementation. FREE ACCESS
  • Locked
    6.  JWT Validation
    4m 31s
    Learn how to validate JWT in a security implementation. FREE ACCESS
  • Locked
    7.  Identifying the User
    4m 12s
    In this video, you will learn how to identify the user. FREE ACCESS
  • Locked
    8.  TLS Mutual Authentication
    5m 53s
    After completing this video, you will be able to illustrate the steps of mutual TLS authentication. FREE ACCESS
  • Locked
    9.  Certificate Revocation
    4m 15s
    During this video, you will learn how to identify the various types of certificate revocation. FREE ACCESS
  • Locked
    10.  Short-lived Certificates
    3m 8s
    Upon completion of this video, you will be able to describe the approach of using short-lived certificates. FREE ACCESS
  • Locked
    11.  The Edge Security
    3m 25s
    After completing this video, you will be able to describe edge security and implement edge security. FREE ACCESS
  • Locked
    12.  Security Considerations
    4m 56s
    Upon completion of this video, you will be able to list and describe the security considerations for securing microservices. FREE ACCESS
  • Locked
    13.  Exercise: Identify and Perform Basic Security
    3m 24s
    In this video, learn how to identify and perform basic security procedures. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 5 users Rating 4.8 of 5 users (5)
Rating 4.6 of 86 users Rating 4.6 of 86 users (86)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.4 of 164 users Rating 4.4 of 164 users (164)
Rating 4.5 of 273 users Rating 4.5 of 273 users (273)