[ ] Udemy - Microservices Security - The Complete Guide 收录时间:2022-06-07 03:21:10 文件大小:1GB 下载次数:1 最近下载:2022-06-07 03:21:10 磁力链接: magnet:?xt=urn:btih:3e9c59dd54d53d285a4b74615950672999d3ae78 立即下载 复制链接 文件列表 ~Get Your Files Here !/6. Application and Data Security/7. Secure Code.mp4 71MB ~Get Your Files Here !/6. Application and Data Security/2. Authentication.mp4 69MB ~Get Your Files Here !/6. Application and Data Security/5. Authorization.mp4 62MB ~Get Your Files Here !/4. Threat Modeling/2. What is Threat Modeling.mp4 56MB ~Get Your Files Here !/6. Application and Data Security/3. OAuth2 Protocol.mp4 51MB ~Get Your Files Here !/7. Microservices and Security/2. Securing microservices network.mp4 44MB ~Get Your Files Here !/1. Introduction/1. Course Introduction.mp4 34MB ~Get Your Files Here !/7. Microservices and Security/3. Securing microservices identity.mp4 31MB ~Get Your Files Here !/6. Application and Data Security/8. Secure Data.mp4 31MB ~Get Your Files Here !/9. Logging and Monitoring/3. Implementing Logging.mp4 29MB ~Get Your Files Here !/3. Introduction to Software Security/2. What is Software Security.mp4 29MB ~Get Your Files Here !/2. Introduction to Microservices/4. Problems with Monolith and SOA.mp4 29MB ~Get Your Files Here !/2. Introduction to Microservices/6. Problems solved by Microservices.mp4 27MB ~Get Your Files Here !/5. Secure Architecture/1. Secure Architecture Introduction.mp4 27MB ~Get Your Files Here !/6. Application and Data Security/6. Secure Communication.mp4 26MB ~Get Your Files Here !/5. Secure Architecture/4. Network Security.mp4 22MB ~Get Your Files Here !/8. Service Mesh/2. Problems solved by Service Mesh.mp4 21MB ~Get Your Files Here !/5. Secure Architecture/5. Platform Security.mp4 20MB ~Get Your Files Here !/3. Introduction to Software Security/3. Software Security Terminology.mp4 19MB ~Get Your Files Here !/6. Application and Data Security/9. Logging and Monitoring.mp4 19MB ~Get Your Files Here !/2. Introduction to Microservices/5. Microservices to the rescue.mp4 19MB ~Get Your Files Here !/2. Introduction to Microservices/3. Service Oriented Architecture.mp4 18MB ~Get Your Files Here !/8. Service Mesh/6. Service Mesh and security.mp4 18MB ~Get Your Files Here !/3. Introduction to Software Security/4. Who is responsible for the Security.mp4 17MB ~Get Your Files Here !/10. Conclusion/2. Conclusion.mp4 16MB ~Get Your Files Here !/2. Introduction to Microservices/2. Monolith Applications.mp4 15MB ~Get Your Files Here !/9. Logging and Monitoring/4. Implementing Monitoring.mp4 14MB ~Get Your Files Here !/4. Threat Modeling/1. Introduction.mp4 14MB ~Get Your Files Here !/6. Application and Data Security/4. Authentication and the Architect.mp4 13MB ~Get Your Files Here !/9. Logging and Monitoring/5. Logging and Security.mp4 13MB ~Get Your Files Here !/5. Secure Architecture/3. Physical Security.mp4 13MB ~Get Your Files Here !/7. Microservices and Security/5. External vs internal services.mp4 13MB ~Get Your Files Here !/4. Threat Modeling/5. Threat Modeling Tools.mp4 13MB ~Get Your Files Here !/6. Application and Data Security/1. Introduction.mp4 13MB ~Get Your Files Here !/4. Threat Modeling/3. Conducting Threat Modeling.mp4 12MB ~Get Your Files Here !/4. Threat Modeling/4. Threat Modeling Methodologies.mp4 11MB ~Get Your Files Here !/8. Service Mesh/4. Types of Service Mesh.mp4 8MB ~Get Your Files Here !/2. Introduction to Microservices/1. Introduction.mp4 8MB ~Get Your Files Here !/1. Introduction/3. Agenda.mp4 7MB ~Get Your Files Here !/3. Introduction to Software Security/1. Introduction.mp4 7MB ~Get Your Files Here !/5. Secure Architecture/2. The 5 Perimeters of Security.mp4 7MB ~Get Your Files Here !/10. Conclusion/1. Download the microservices security checklist.mp4 7MB ~Get Your Files Here !/9. Logging and Monitoring/2. Logging vs Monitoring.mp4 7MB ~Get Your Files Here !/9. Logging and Monitoring/1. Introduction to Logging and Monitoring.mp4 6MB ~Get Your Files Here !/4. Threat Modeling/6. Summary.mp4 6MB ~Get Your Files Here !/8. Service Mesh/5. Products and implementations.mp4 5MB ~Get Your Files Here !/8. Service Mesh/3. Anatomy of Service Mesh.mp4 5MB ~Get Your Files Here !/7. Microservices and Security/1. Security challenges with microservices.mp4 5MB ~Get Your Files Here !/1. Introduction/2. Who Is This Course For.mp4 3MB ~Get Your Files Here !/8. Service Mesh/1. Introduction to Service Mesh.mp4 3MB ~Get Your Files Here !/7. Microservices and Security/4. Securing microservices data.mp4 3MB ~Get Your Files Here !/10. Conclusion/1.1 Microservices Security Check List.pdf 299KB ~Get Your Files Here !/6. Application and Data Security/10.1 Application and Data Security Call to Action.pdf 58KB ~Get Your Files Here !/7. Microservices and Security/6.1 Microservices and Security Call to Action.pdf 55KB ~Get Your Files Here !/9. Logging and Monitoring/6.1 Logging and Monitoring Call to Action.pdf 51KB ~Get Your Files Here !/8. Service Mesh/7.1 Service Mesh Call to Action.pdf 49KB ~Get Your Files Here !/4. Threat Modeling/7.1 Threat Modeling Call to Action.pdf 45KB ~Get Your Files Here !/6. Application and Data Security/2. Authentication.srt 29KB ~Get Your Files Here !/6. Application and Data Security/7. Secure Code.srt 26KB ~Get Your Files Here !/10. Conclusion/3. Bonus Lecture.html 22KB ~Get Your Files Here !/6. Application and Data Security/5. Authorization.srt 20KB ~Get Your Files Here !/4. Threat Modeling/2. What is Threat Modeling.srt 19KB ~Get Your Files Here !/6. Application and Data Security/3. OAuth2 Protocol.srt 17KB ~Get Your Files Here !/9. Logging and Monitoring/3. Implementing Logging.srt 16KB ~Get Your Files Here !/7. Microservices and Security/2. Securing microservices network.srt 15KB ~Get Your Files Here !/6. Application and Data Security/8. Secure Data.srt 13KB ~Get Your Files Here !/2. Introduction to Microservices/4. Problems with Monolith and SOA.srt 13KB ~Get Your Files Here !/2. Introduction to Microservices/6. Problems solved by Microservices.srt 12KB ~Get Your Files Here !/7. Microservices and Security/3. Securing microservices identity.srt 12KB ~Get Your Files Here !/6. Application and Data Security/6. Secure Communication.srt 12KB ~Get Your Files Here !/1. Introduction/1. Course Introduction.srt 10KB ~Get Your Files Here !/8. Service Mesh/2. Problems solved by Service Mesh.srt 10KB ~Get Your Files Here !/5. Secure Architecture/4. Network Security.srt 9KB ~Get Your Files Here !/5. Secure Architecture/1. Secure Architecture Introduction.srt 9KB ~Get Your Files Here !/3. Introduction to Software Security/2. What is Software Security.srt 9KB ~Get Your Files Here !/2. Introduction to Microservices/3. Service Oriented Architecture.srt 8KB ~Get Your Files Here !/6. Application and Data Security/9. Logging and Monitoring.srt 7KB ~Get Your Files Here !/5. Secure Architecture/5. Platform Security.srt 7KB ~Get Your Files Here !/2. Introduction to Microservices/2. Monolith Applications.srt 7KB ~Get Your Files Here !/3. Introduction to Software Security/3. Software Security Terminology.srt 7KB ~Get Your Files Here !/2. Introduction to Microservices/5. Microservices to the rescue.srt 7KB ~Get Your Files Here !/8. Service Mesh/6. Service Mesh and security.srt 7KB ~Get Your Files Here !/3. Introduction to Software Security/4. Who is responsible for the Security.srt 6KB ~Get Your Files Here !/6. Application and Data Security/4. Authentication and the Architect.srt 5KB ~Get Your Files Here !/9. Logging and Monitoring/4. Implementing Monitoring.srt 5KB ~Get Your Files Here !/6. Application and Data Security/1. Introduction.srt 5KB ~Get Your Files Here !/7. Microservices and Security/5. External vs internal services.srt 5KB ~Get Your Files Here !/8. Service Mesh/4. Types of Service Mesh.srt 5KB ~Get Your Files Here !/9. Logging and Monitoring/5. Logging and Security.srt 5KB ~Get Your Files Here !/10. Conclusion/2. Conclusion.srt 5KB ~Get Your Files Here !/4. Threat Modeling/4. Threat Modeling Methodologies.srt 4KB ~Get Your Files Here !/4. Threat Modeling/5. Threat Modeling Tools.srt 4KB ~Get Your Files Here !/4. Threat Modeling/3. Conducting Threat Modeling.srt 4KB ~Get Your Files Here !/4. Threat Modeling/1. Introduction.srt 4KB ~Get Your Files Here !/5. Secure Architecture/3. Physical Security.srt 3KB ~Get Your Files Here !/5. Secure Architecture/2. The 5 Perimeters of Security.srt 3KB ~Get Your Files Here !/9. Logging and Monitoring/2. Logging vs Monitoring.srt 3KB ~Get Your Files Here !/8. Service Mesh/5. Products and implementations.srt 3KB ~Get Your Files Here !/1. Introduction/3. Agenda.srt 3KB ~Get Your Files Here !/8. Service Mesh/3. Anatomy of Service Mesh.srt 3KB ~Get Your Files Here !/9. Logging and Monitoring/1. Introduction to Logging and Monitoring.srt 3KB ~Get Your Files Here !/4. Threat Modeling/6. Summary.srt 2KB ~Get Your Files Here !/10. Conclusion/1. Download the microservices security checklist.srt 2KB ~Get Your Files Here !/2. Introduction to Microservices/1. Introduction.srt 2KB ~Get Your Files Here !/7. Microservices and Security/1. Security challenges with microservices.srt 2KB ~Get Your Files Here !/3. Introduction to Software Security/1. Introduction.srt 2KB ~Get Your Files Here !/1. Introduction/2. Who Is This Course For.srt 1KB ~Get Your Files Here !/8. Service Mesh/1. Introduction to Service Mesh.srt 1KB ~Get Your Files Here !/7. Microservices and Security/4. Securing microservices data.srt 1KB ~Get Your Files Here !/Bonus Resources.txt 357B ~Get Your Files Here !/4. Threat Modeling/7. Threat modeling call to action.html 317B ~Get Your Files Here !/7. Microservices and Security/6. Microservices and security call to action.html 279B ~Get Your Files Here !/6. Application and Data Security/10. Application and Data Security Call to Action.html 274B ~Get Your Files Here !/9. Logging and Monitoring/6. Logging and monitoring call to action.html 257B ~Get Your Files Here !/8. Service Mesh/7. Service mesh call to action.html 250B ~Get Your Files Here !/2. Introduction to Microservices/7. Test your knowledge Microservices.html 196B ~Get Your Files Here !/3. Introduction to Software Security/5. Test your knowledge of Software Security.html 196B ~Get Your Files Here !/4. Threat Modeling/8. Test your knowledge on Threat Modeling.html 196B ~Get Your Files Here !/5. Secure Architecture/6. Test your knowledge of Secure Architecture.html 196B ~Get Your Files Here !/6. Application and Data Security/11. Test your knowledge of application and data security.html 196B ~Get Your Files Here !/7. Microservices and Security/7. Test your knowledge of microservices security.html 196B ~Get Your Files Here !/8. Service Mesh/8. Test your knowledge of service mesh.html 196B ~Get Your Files Here !/9. Logging and Monitoring/7. Test your knowledge of logging and monitoring.html 196B Get Bonus Downloads Here.url 183B