
Oreilly – Securing Microservices Protect Sensitive Data in Transit and at Rest
English | Size: 0.99 GB
Category: CBTs
Microservice architectures offer a lot of advantages: making it easier to scale your application and team, use different technology, and ship features more quickly. However, they also create serious challenges, such as how to properly ensure that the systems you create are secure. If done well, microservice architectures can be significantly more secure than other types of software, but if approached in a naive fashion, you can end up with a less secure, more compromised system. This video provides the sophisticated knowledge you need to create secure architectures from the ground up. The course works best for participants who understand what microservices are and who have some experience working with distributed systems.
Discover the best framework to use when considering the security aspects of microservices
Learn how to handle authorization and authentication, transport security, and patch hygiene
Explore new technologies that help implement secure distributed systems in easier ways
After spending time at multiple startups and 12 years at ThoughtWorks, Sam Newman is now an independent consultant. Specializing in microservices, cloud, and continuous delivery, Sam helps clients around the world deliver software faster and more reliably. An in-demand speaker at O’Reilly Media’s Software Architecture and Security conferences, Sam is the author of multiple O’Reilly Media titles, including Building Microservices and Microservices at Scale.
Table of Contents
Securing Microservices 00:05:31
Just Enough Microservices 00:04:36
A Model for Application Security 00:01:57
Prevention: Threat Modelling 00:14:52
Prevention: Protection in Transit 00:11:28
Prevention: Authentication and Authorization 00:15:25
Prevention: Service Meshes 00:10:22
Prevention: Data at Rest 00:13:36
Prevention: Keeping a Secret 00:13:25
Prevention: Patching 00:06:32
Prevention: Docker 00:09:53
Prevention: The Three Rs 00:03:31
Detection: Monitoring 00:10:28
Detection: Challenges of Polyglot 00:03:19
Response 00:09:57
Recovery: Burn It Down! 00:10:30
Recovery: Post-mortems 00:08:35
Summary 00:02:01
DOWNLOAD:

https://rapidgator.net/file/e7a90f7ae923fe9f4b9d4ee96b0f23a7/Securing_Microservices_Protect_Sensitive_Data_in_Transit_and_at_Rest.part1.rar.html
https://rapidgator.net/file/a18e3e3b7bd824becd1066ac38353e69/Securing_Microservices_Protect_Sensitive_Data_in_Transit_and_at_Rest.part2.rar.html
http://nitroflare.com/view/DEA841A82F240B1/Securing_Microservices_Protect_Sensitive_Data_in_Transit_and_at_Rest.part1.rar
http://nitroflare.com/view/D3D46AD2F5DAD62/Securing_Microservices_Protect_Sensitive_Data_in_Transit_and_at_Rest.part2.rar%5B/center%5D%5B/quote%5D
Leave a Reply