08-02-2024, 07:08 AM
[center]![[Image: 25d281affd33b264045e502bf00ebd73.jpg]](https://i123.fastpic.org/big/2024/0801/73/25d281affd33b264045e502bf00ebd73.jpg)
Last updated 7/2024
Created by Howard Hyde
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 66 Lectures ( 7h 57m ) | Size: 4.74 GB
[/center]
[center]
With Spring Security, JWT, SSL/TLS, HTTPS, Digital Certificates and Public Key Infrastructure (PKI)
[/center]
What you'll learn:
Comprehensive Security for Spring Boot REST web service applications: HTTPS, User management, Authentication, Role-based Authorization
General principles of cyber security: Threats and defenses, Cryptography (encryption/decryption/hashing; symmetric/asymmetric), TLS, cypher suites
Implementing user/security and business databases, JSON Web Tokens (JWTs) and SSL/TLS over HTTP (HTTPS) communication with web services
Spring Security Framework: Architecture, Theory, practical examples: Configuration, filters, authentication and authorization
Requirements:
Intermediate Java programming and Spring Boot development knowledge
Description:
A complete practical case study and tutorialfeaturing the Spring Security framework.Filters and configurationAuthenticationJSON Web Tokens (JWT)Role-based AuthorizationIn-depth theoryAlso:General Cybersecurity principles and conceptsCryptography: Encryption, encoding and hashingSymmetric and Asymmetric (public/private key) encryptionHTTP over SSL/TLS (HTTPS)Digital Certificates & Public Key Infrastructure (PKI) TLS Cipher Suites and handshakesCase study of a Demo App with 2 Spring Boot REST web services, an Angular/Typescript UI client app and PostGreSQL database(s), whichEncrypts all communication between browser and server via HTTP over SSL/TLS (HTTPS)Establishes trust via signed digital certificates (Public Key Infrastructure -- PKI)Requires valid credentials to log in.Custom example user/role/resource/action/authority database.Limits access to resources in web service and client app according to roles / authorities of user account; detailed development of AuthorizationEmploys JSON Web Tokens (JWTs) as its authorization mechanism.NOT WebMvc: Does NOT track sessions or JSESSONID cookies; does not output HMTL, login forms etc. (not JSP or Thymeleaf)Rather, REpresentational State Transfer (REST): Exchanges JSON data payloads with clientsAssumes clients take care of all UI elements, HTML code, css, Javascript etc. Course StructurePart 0: Is this Course Right for Me?Part 1: General Cyber Security PrinciplesPart 2: Introducing the Demo App and its ComponentsPart 3: Application Security elements BEFORE adding the Spring Security FrameworkPart 4: The Spring Security Framework in our Demo AppPart 5: A Deeper Dive into Spring Security Architecture and Theory
Who this course is for:
Web service developers/software engineers, architects, cyber security professionals
Homepage
![[Image: 25d281affd33b264045e502bf00ebd73.jpg]](https://i123.fastpic.org/big/2024/0801/73/25d281affd33b264045e502bf00ebd73.jpg)
Last updated 7/2024
Created by Howard Hyde
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 66 Lectures ( 7h 57m ) | Size: 4.74 GB
[/center]
[center]
With Spring Security, JWT, SSL/TLS, HTTPS, Digital Certificates and Public Key Infrastructure (PKI)
[/center]
What you'll learn:
Comprehensive Security for Spring Boot REST web service applications: HTTPS, User management, Authentication, Role-based Authorization
General principles of cyber security: Threats and defenses, Cryptography (encryption/decryption/hashing; symmetric/asymmetric), TLS, cypher suites
Implementing user/security and business databases, JSON Web Tokens (JWTs) and SSL/TLS over HTTP (HTTPS) communication with web services
Spring Security Framework: Architecture, Theory, practical examples: Configuration, filters, authentication and authorization
Requirements:
Intermediate Java programming and Spring Boot development knowledge
Description:
A complete practical case study and tutorialfeaturing the Spring Security framework.Filters and configurationAuthenticationJSON Web Tokens (JWT)Role-based AuthorizationIn-depth theoryAlso:General Cybersecurity principles and conceptsCryptography: Encryption, encoding and hashingSymmetric and Asymmetric (public/private key) encryptionHTTP over SSL/TLS (HTTPS)Digital Certificates & Public Key Infrastructure (PKI) TLS Cipher Suites and handshakesCase study of a Demo App with 2 Spring Boot REST web services, an Angular/Typescript UI client app and PostGreSQL database(s), whichEncrypts all communication between browser and server via HTTP over SSL/TLS (HTTPS)Establishes trust via signed digital certificates (Public Key Infrastructure -- PKI)Requires valid credentials to log in.Custom example user/role/resource/action/authority database.Limits access to resources in web service and client app according to roles / authorities of user account; detailed development of AuthorizationEmploys JSON Web Tokens (JWTs) as its authorization mechanism.NOT WebMvc: Does NOT track sessions or JSESSONID cookies; does not output HMTL, login forms etc. (not JSP or Thymeleaf)Rather, REpresentational State Transfer (REST): Exchanges JSON data payloads with clientsAssumes clients take care of all UI elements, HTML code, css, Javascript etc. Course StructurePart 0: Is this Course Right for Me?Part 1: General Cyber Security PrinciplesPart 2: Introducing the Demo App and its ComponentsPart 3: Application Security elements BEFORE adding the Spring Security FrameworkPart 4: The Spring Security Framework in our Demo AppPart 5: A Deeper Dive into Spring Security Architecture and Theory
Who this course is for:
Web service developers/software engineers, architects, cyber security professionals
Homepage
Quote:Buy Premium From My Links To Get Resumable Support and Max Speed
https://rapidgator.net/file/ce0c2bcd36e3...1.rar.html
https://rapidgator.net/file/87aee9d7d042...2.rar.html
https://rapidgator.net/file/2925480d52b5...3.rar.html
https://rapidgator.net/file/d5249874e8a8...4.rar.html
https://rapidgator.net/file/4ed215c05b38...5.rar.html
https://ddownload.com/a6jqim4y7vg5/Secur....part1.rar
https://ddownload.com/t978jtr06ebm/Secur....part2.rar
https://ddownload.com/cst4yecucfyw/Secur....part3.rar
https://ddownload.com/pc02j2kax3eo/Secur....part4.rar
https://ddownload.com/rst5z45zlykq/Secur....part5.rar















