Oreilly – Securing Microservices Protect Sensitive Data in Transit and at Rest

Oreilly – Securing Microservices Protect Sensitive Data in Transit and at Rest
English | Size: 0.99 GB
Category: CBTs

Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. If done well, microservice architectures can be significantly more secure than other types of software, but if approached in a naive fashion, you can end up with a less secure, more compromised system. This video provides the sophisticated knowledge you need to create secure architectures from the ground up. The course works best for participants who understand what microservices are and who have some experience working with distributed systems. [Read more…]

OREILLY Securing Microservices Protect Sensitive Data in Transit and at Rest-RiDWARE

OREILLY Securing Microservices Protect Sensitive Data in Transit and at Rest-RiDWARE
English | Size: 3.19 GB
Category: Tutorial

Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. [Read more…]

Pluralsight – Web App Hacking – Sensitive Data Exposure

Pluralsight – Web App Hacking – Sensitive Data Exposure
English | Size: 129.76 MB
Category: Tutorial

This course helps to understand various types of sensitive data exposure in modern web applications. You’ll learn about testing for sensitive data exposure, common problems, and countermeasures.
Sensitive data exposure can lead to very severe consequences (user impersonation, account takeover, disclosure of credentials – to name a few). In this course, Web App Hacking: Sensitive Data Exposure, you’ll learn about various types of sensitive data exposure in modern web applications. First, you’ll see how the attacker can learn the credentials to the database as a result of insecure error handling. Next, you’ll learn how the attacker can read the content of sensitive files, when the files are insecurely processed. [Read more…]

Skip to toolbar