Java Spring Cloud: Securing Microservices
Spring Cloud Finchley.M5
| Intermediate
- 13 videos | 58m 20s
- Includes Assessment
- Earns a Badge
Explore the concepts and tasks involved in securing microservices. This course teaches you the standard approach and principles that drive DevOps security, including application-level security of microservices. You will begin by learning how to enable secure service-to-service communication with microservices. Next you will examine the role of JSON Web Token (JWT) in a security implementation. Then learn about the techniques to validate JWT in a security implementation. As you progress further through the course, you will walk through the steps of TLS mutual authentication, and identify various types of certificate revocation as well as methods to apply short-lived certificates to enhance security. Finally, learn about edge security and how to secure microservices.
WHAT YOU WILL LEARN
-
Describe the standard approach to securing microservicesList the principles driving security with devopsSpecify the application level security of microservicesEnable secure service-to-service communication with microservicesDescribe the role of json jwt in a security implementationValidate jwt in a security implementationDemonstrate the process of identifying the user
-
Illustrate the steps of tls mutual authenticationIdentify the various types of certificate revocationDescribe the approach of using short-lived certificatesDescribe edge security and demonstrate the implementation of edge securityList and describe the security considerations to secure microservicesidentify and perform basic security
IN THIS COURSE
-
5m 43sUpon completion of this video, you will be able to describe the standard approach to securing microservices. FREE ACCESS
-
6m 26sAfter completing this video, you will be able to list the principles driving security with DevOps. FREE ACCESS
-
4m 37sUpon completion of this video, you will be able to specify the application-level security of microservices. FREE ACCESS
-
2m 29sDuring this video, you will learn how to enable secure communication between microservices. FREE ACCESS
-
5m 23sUpon completion of this video, you will be able to describe the role of JSON Web Token in a security implementation. FREE ACCESS
-
4m 31sLearn how to validate JWT in a security implementation. FREE ACCESS
-
4m 12sIn this video, you will learn how to identify the user. FREE ACCESS
-
5m 53sAfter completing this video, you will be able to illustrate the steps of mutual TLS authentication. FREE ACCESS
-
4m 15sDuring this video, you will learn how to identify the various types of certificate revocation. FREE ACCESS
-
3m 8sUpon completion of this video, you will be able to describe the approach of using short-lived certificates. FREE ACCESS
-
3m 25sAfter completing this video, you will be able to describe edge security and implement edge security. FREE ACCESS
-
4m 56sUpon completion of this video, you will be able to list and describe the security considerations for securing microservices. FREE ACCESS
-
3m 24sIn this video, learn how to identify and perform basic security procedures. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.