Oreilly – Securing Microservices Protect Sensitive Data in Transit and at Rest

Oreilly – Securing Microservices Protect Sensitive Data in Transit and at Rest
English | Size: 0.99 GB
Category: CBTs

Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. If done well, microservice architectures can be significantly more secure than other types of software, but if approached in a naive fashion, you can end up with a less secure, more compromised system. This video provides the sophisticated knowledge you need to create secure architectures from the ground up. The course works best for participants who understand what microservices are and who have some experience working with distributed systems.

Discover the best framework to use when considering the security aspects of microservices
Learn how to handle authorization and authentication, transport security, and patch hygiene
Explore new technologies that help implement secure distributed systems in easier ways
After spending time at multiple startups and 12 years at ThoughtWorks, Sam Newman is now an independent consultant. Specializing in microservices, cloud, and continuous delivery, Sam helps clients around the world deliver software faster and more reliably. An in-demand speaker at O’Reilly Media’s Software Architecture and Security conferences, Sam is the author of multiple O’Reilly Media titles, including Building Microservices and Microservices at Scale.

Table of Contents
Securing Microservices 00:05:31
Just Enough Microservices 00:04:36
A Model for Application Security 00:01:57
Prevention: Threat Modelling 00:14:52
Prevention: Protection in Transit 00:11:28
Prevention: Authentication and Authorization 00:15:25
Prevention: Service Meshes 00:10:22
Prevention: Data at Rest 00:13:36
Prevention: Keeping a Secret 00:13:25
Prevention: Patching 00:06:32
Prevention: Docker 00:09:53
Prevention: The Three Rs 00:03:31
Detection: Monitoring 00:10:28
Detection: Challenges of Polyglot 00:03:19
Response 00:09:57
Recovery: Burn It Down! 00:10:30
Recovery: Post-mortems 00:08:35
Summary 00:02:01

Buy Long-term Premium Accounts To Support Me & Max Speed

DOWNLOAD:

If any links die or problem unrar, send request to http://goo.gl/aUHSZc

About WoW Team

I'm WoW Team , I love to share all the video tutorials. If you have a video tutorial, please send me, I'll post on my website. Because knowledge is not limited to, irrespective of qualifications, people join hands to help me.

Skip to toolbar