Udemy - Microservices Security - The Complete Guide

seeders: 11
leechers: 11
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 91
  • Language: English

Files

[ FreeCourseWeb.com ] Udemy - Microservices Security - The Complete Guide
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1. Introduction
    • 1. Course Introduction.mp4 (33.5 MB)
    • 1. Course Introduction.srt (10.5 KB)
    • 2. Who Is This Course For.mp4 (3.3 MB)
    • 2. Who Is This Course For.srt (1.3 KB)
    • 3. Agenda.mp4 (7.1 MB)
    • 3. Agenda.srt (2.8 KB)
    10. Conclusion
    • 1. Download the microservices security checklist.mp4 (6.7 MB)
    • 1. Download the microservices security checklist.srt (1.8 KB)
    • 1.1 Microservices Security Check List.pdf (298.6 KB)
    • 2. Conclusion.mp4 (15.7 MB)
    • 2. Conclusion.srt (4.7 KB)
    • 3. Bonus Lecture.html (21.8 KB)
    2. Introduction to Microservices
    • 1. Introduction.mp4 (7.9 MB)
    • 1. Introduction.srt (1.8 KB)
    • 2. Monolith Applications.mp4 (14.9 MB)
    • 2. Monolith Applications.srt (6.8 KB)
    • 3. Service Oriented Architecture.mp4 (18.1 MB)
    • 3. Service Oriented Architecture.srt (8.0 KB)
    • 4. Problems with Monolith and SOA.mp4 (28.9 MB)
    • 4. Problems with Monolith and SOA.srt (12.5 KB)
    • 5. Microservices to the rescue.mp4 (18.8 MB)
    • 5. Microservices to the rescue.srt (6.7 KB)
    • 6. Problems solved by Microservices.mp4 (26.9 MB)
    • 6. Problems solved by Microservices.srt (12.4 KB)
    • 7. Test your knowledge Microservices.html (0.2 KB)
    3. Introduction to Software Security
    • 1. Introduction.mp4 (7.0 MB)
    • 1. Introduction.srt (1.7 KB)
    • 2. What is Software Security.mp4 (29.0 MB)
    • 2. What is Software Security.srt (8.6 KB)
    • 3. Software Security Terminology.mp4 (19.1 MB)
    • 3. Software Security Terminology.srt (6.7 KB)
    • 4. Who is responsible for the Security.mp4 (16.6 MB)
    • 4. Who is responsible for the Security.srt (5.8 KB)
    • 5. Test your knowledge of Software Security.html (0.2 KB)
    4. Threat Modeling
    • 1. Introduction.mp4 (13.9 MB)
    • 1. Introduction.srt (3.5 KB)
    • 2. What is Threat Modeling.mp4 (56.2 MB)
    • 2. What is Threat Modeling.srt (19.3 KB)
    • 3. Conducting Threat Modeling.mp4 (11.9 MB)
    • 3. Conducting Threat Modeling.srt (3.8 KB)
    • 4. Threat Modeling Methodologies.mp4 (10.5 MB)
    • 4. Threat Modeling Methodologies.srt (4.2 KB)
    • 5. Threat Modeling Tools.mp4 (12.7 MB)
    • 5. Threat Modeling Tools.srt (3.9 KB)
    • 6. Summary.mp4 (6.0 MB)
    • 6. Summary.srt (1.9 KB)
    • 7. Threat modeling call to action.html (0.3 KB)
    • 7.1 Threat Modeling Call to Action.pdf (44.9 KB)
    • 8. Test your knowledge on Threat Modeling.html (0.2 KB)
    5. Secure Architecture
    • 1. Secure Architecture Introduction.mp4 (26.5 MB)
    • 1. Secure Architecture Introduction.srt (8.8 KB)
    • 2. The 5 Perimeters of Security.mp4 (6.7 MB)
    • 2. The 5 Perimeters of Security.srt (3.4 KB)
    • 3. Physical Security.mp4 (12.7 MB)
    • 3. Physical Security.srt (3.5 KB)
    • 4. Network Security.mp4 (21.6 MB)
    • 4. Network Security.srt (9.1 KB)
    • 5. Platform Security.mp4 (19.6 MB)
    • 5. Platform Security.srt (7.2 KB)
    • 6. Test your knowledge of Secure Architecture.html (0.2 KB)
    6. Application and Data Security
    • 1. Introduction.mp4 (12.6 MB)
    • 1. Introduction.srt (5.2 KB)
    • 10. Application and Data Security Call to Action.html (0.3 KB)
    • 10.1 Application and Data Security Call to Action.pdf (58.0 KB)
    • 11. Test your knowledge of application and data security.html (0.2 KB)
    • 2. Authentication.mp4 (68.9 MB)
    • 2. Authentication.srt (28.6 KB)
    • 3. OAuth2 Protocol.mp4 (51.0 MB)
    • 3. OAuth2 Protocol.srt (16.9 KB)
    • 4. Authentication and the Architect.mp4 (13.2 MB)
    • 4. Authentication and the Architect.srt (5.4 KB)
    • 5. Authorization.mp4 (61.7 MB)
    • 5. Authorization.srt (20.4 KB)
    • 6. Secure Communication.mp4 (25.6 MB)
    • 6. Secure Communication.srt (11.6 KB)
    • 7. Secure Code.mp4 (71.2 MB)
    • 7. Secure Code.srt (26.3 KB)
    • 8. Secure Data.mp4 (31.1 MB)
    • 8. Secure Data.srt (12.6 KB)
    • 9. Logging and Monitoring.mp4 (18.8 MB)
    • 9. Logging and Monitoring.srt (7.3 KB)
    7. Microservices and Security
    • 1. Security challenges with microservices.mp4 (4.5 MB)
    • 1. Security challenges with microservices.srt (1.7 KB)
    • 2. Securing microservices network.mp4 (44.1 MB)
    • 2. Securing microservices network.srt (15.0 KB)
    • 3. Securing microservices identity.mp4 (31.4 MB)
    • 3. Securing microservices identity.srt (11.9 KB)
    • 4. Securing microservices data.mp4 (2.7 MB)
    • 4. Securing microservices data.srt (1.1 KB)
    • 5. External vs internal services.mp4 (12.7 MB)
    • 5. External vs internal services.srt (5.2 KB)
    • 6. Microservices and security call to action.html (0.3 KB)
    • 6.1 Microservices and Security Call to Action.pdf (55.3 KB)
    • 7. Test your knowledge of microservices security.html (0.2 KB)
    8. Service Mesh
    • 1. Introduction to Service Mesh.mp4 (3.2 MB)
    • 1. Introduction to Service Mesh.srt (1.3 KB)
    • 2. Problems solved by Service Mesh.mp4 (21.0 MB)
    • 2. Problems solved by Service Mesh.srt (9.8 KB)
    • 3. Anatomy of Service Mesh.mp4 (4.8 MB)
    • 3. Anatomy of Service Mesh.srt (2.7 KB)
    • 4. Types of Service Mesh.mp4 (8.4 MB)
    • 4. Types of Service Mesh.srt (4.8 KB)
    • 5. Products and implementations.mp4 (5.5 MB)
    • 5. Products and implementations.srt (3.1 KB)
    • 6. Service Mesh and security.mp4 (17.6 MB)
    • 6. Service Mesh and security.srt (6.5 KB)
    • 7. Service mesh c

Description

Microservices Security - The Complete Guide



Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.00 GB | Duration: 5h 5m
Design secure and robust microservices systems using the most up-to-date security best practices
What you'll learn
The basics of microservices architecture
Extensive, practical knowledge about Software Security, from the basics to the advanced
Software Security terminology (DDoS, MFA, SQL Injection, and lots more)
The Software Architect's role in Software Security
The main security threats every developer and architect should be aware of
Unique security challenges in microservices architecture
Using logging and monitoring to improve the system's security

Description
Software Security is one of the most important aspects of Software Architecture these days.

Almost every day you hear about new security incidents which caused data leaks, disruption of service, and often - billions of dollar in damages. In fact - some companies even shut down because of that.

You, as as software architect, have the responsibility to make sure your architecture is as secure as possible.



Download torrent
1 GB
seeders:11
leechers:11
Udemy - Microservices Security - The Complete Guide


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
1 GB
seeders:11
leechers:11
Udemy - Microservices Security - The Complete Guide


Torrent hash: 3E9C59DD54D53D285A4B74615950672999D3AE78