Security in Spring Boot REST Web Service Applications

dkmdkm

U P L O A D E R
8b987d527c4eef6e473dddcd30a961b7.jpg

Free Download Security in Spring Boot REST Web Service Applications
Last updated 7/2024
Created by Howard Hyde
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 66 Lectures ( 7h 57m ) | Size: 4.74 GB

With Spring Security, JWT, SSL/TLS, HTTPS, Digital Certificates and Public Key Infrastructure (PKI)
What you'll learn:
Comprehensive Security for Spring Boot REST web service applications: HTTPS, User management, Authentication, Role-based Authorization
General principles of cyber security: Threats and defenses, Cryptography (encryption/decryption/hashing; symmetric/asymmetric), TLS, cypher suites
Implementing user/security and business databases, JSON Web Tokens (JWTs) and SSL/TLS over HTTP (HTTPS) communication with web services
Spring Security Framework: Architecture, Theory, practical examples: Configuration, filters, authentication and authorization
Requirements:
Intermediate Java programming and Spring Boot development knowledge
Description:
A complete practical case study and tutorialfeaturing the Spring Security framework.Filters and configurationAuthenticationJSON Web Tokens (JWT)Role-based AuthorizationIn-depth theoryAlso:General Cybersecurity principles and conceptsCryptography: Encryption, encoding and hashingSymmetric and Asymmetric (public/private key) encryptionHTTP over SSL/TLS (HTTPS)Digital Certificates & Public Key Infrastructure (PKI) TLS Cipher Suites and handshakesCase study of a Demo App with 2 Spring Boot REST web services, an Angular/Typescript UI client app and PostGreSQL database(s), whichEncrypts all communication between browser and server via HTTP over SSL/TLS (HTTPS)Establishes trust via signed digital certificates (Public Key Infrastructure -- PKI)Requires valid credentials to log in.Custom example user/role/resource/action/authority database.Limits access to resources in web service and client app according to roles / authorities of user account; detailed development of AuthorizationEmploys JSON Web Tokens (JWTs) as its authorization mechanism.NOT WebMvc: Does NOT track sessions or JSESSONID cookies; does not output HMTL, login forms etc. (not JSP or Thymeleaf)Rather, REpresentational State Transfer (REST): Exchanges JSON data payloads with clientsAssumes clients take care of all UI elements, HTML code, css, Javascript etc. Course StructurePart 0: Is this Course Right for Me?Part 1: General Cyber Security PrinciplesPart 2: Introducing the Demo App and its ComponentsPart 3: Application Security elements BEFORE adding the Spring Security FrameworkPart 4: The Spring Security Framework in our Demo AppPart 5: A Deeper Dive into Spring Security Architecture and Theory
Who this course is for:
Web service developers/software engineers, architects, cyber security professionals
Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!


DDOWNLOAD

Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten