589689.xyz

[ ] Udemy - Microservices Security - The Complete Guide

  • 收录时间:2022-06-07 03:21:10
  • 文件大小:1GB
  • 下载次数:1
  • 最近下载:2022-06-07 03:21:10
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/6. Application and Data Security/7. Secure Code.mp4 71MB
  2. ~Get Your Files Here !/6. Application and Data Security/2. Authentication.mp4 69MB
  3. ~Get Your Files Here !/6. Application and Data Security/5. Authorization.mp4 62MB
  4. ~Get Your Files Here !/4. Threat Modeling/2. What is Threat Modeling.mp4 56MB
  5. ~Get Your Files Here !/6. Application and Data Security/3. OAuth2 Protocol.mp4 51MB
  6. ~Get Your Files Here !/7. Microservices and Security/2. Securing microservices network.mp4 44MB
  7. ~Get Your Files Here !/1. Introduction/1. Course Introduction.mp4 34MB
  8. ~Get Your Files Here !/7. Microservices and Security/3. Securing microservices identity.mp4 31MB
  9. ~Get Your Files Here !/6. Application and Data Security/8. Secure Data.mp4 31MB
  10. ~Get Your Files Here !/9. Logging and Monitoring/3. Implementing Logging.mp4 29MB
  11. ~Get Your Files Here !/3. Introduction to Software Security/2. What is Software Security.mp4 29MB
  12. ~Get Your Files Here !/2. Introduction to Microservices/4. Problems with Monolith and SOA.mp4 29MB
  13. ~Get Your Files Here !/2. Introduction to Microservices/6. Problems solved by Microservices.mp4 27MB
  14. ~Get Your Files Here !/5. Secure Architecture/1. Secure Architecture Introduction.mp4 27MB
  15. ~Get Your Files Here !/6. Application and Data Security/6. Secure Communication.mp4 26MB
  16. ~Get Your Files Here !/5. Secure Architecture/4. Network Security.mp4 22MB
  17. ~Get Your Files Here !/8. Service Mesh/2. Problems solved by Service Mesh.mp4 21MB
  18. ~Get Your Files Here !/5. Secure Architecture/5. Platform Security.mp4 20MB
  19. ~Get Your Files Here !/3. Introduction to Software Security/3. Software Security Terminology.mp4 19MB
  20. ~Get Your Files Here !/6. Application and Data Security/9. Logging and Monitoring.mp4 19MB
  21. ~Get Your Files Here !/2. Introduction to Microservices/5. Microservices to the rescue.mp4 19MB
  22. ~Get Your Files Here !/2. Introduction to Microservices/3. Service Oriented Architecture.mp4 18MB
  23. ~Get Your Files Here !/8. Service Mesh/6. Service Mesh and security.mp4 18MB
  24. ~Get Your Files Here !/3. Introduction to Software Security/4. Who is responsible for the Security.mp4 17MB
  25. ~Get Your Files Here !/10. Conclusion/2. Conclusion.mp4 16MB
  26. ~Get Your Files Here !/2. Introduction to Microservices/2. Monolith Applications.mp4 15MB
  27. ~Get Your Files Here !/9. Logging and Monitoring/4. Implementing Monitoring.mp4 14MB
  28. ~Get Your Files Here !/4. Threat Modeling/1. Introduction.mp4 14MB
  29. ~Get Your Files Here !/6. Application and Data Security/4. Authentication and the Architect.mp4 13MB
  30. ~Get Your Files Here !/9. Logging and Monitoring/5. Logging and Security.mp4 13MB
  31. ~Get Your Files Here !/5. Secure Architecture/3. Physical Security.mp4 13MB
  32. ~Get Your Files Here !/7. Microservices and Security/5. External vs internal services.mp4 13MB
  33. ~Get Your Files Here !/4. Threat Modeling/5. Threat Modeling Tools.mp4 13MB
  34. ~Get Your Files Here !/6. Application and Data Security/1. Introduction.mp4 13MB
  35. ~Get Your Files Here !/4. Threat Modeling/3. Conducting Threat Modeling.mp4 12MB
  36. ~Get Your Files Here !/4. Threat Modeling/4. Threat Modeling Methodologies.mp4 11MB
  37. ~Get Your Files Here !/8. Service Mesh/4. Types of Service Mesh.mp4 8MB
  38. ~Get Your Files Here !/2. Introduction to Microservices/1. Introduction.mp4 8MB
  39. ~Get Your Files Here !/1. Introduction/3. Agenda.mp4 7MB
  40. ~Get Your Files Here !/3. Introduction to Software Security/1. Introduction.mp4 7MB
  41. ~Get Your Files Here !/5. Secure Architecture/2. The 5 Perimeters of Security.mp4 7MB
  42. ~Get Your Files Here !/10. Conclusion/1. Download the microservices security checklist.mp4 7MB
  43. ~Get Your Files Here !/9. Logging and Monitoring/2. Logging vs Monitoring.mp4 7MB
  44. ~Get Your Files Here !/9. Logging and Monitoring/1. Introduction to Logging and Monitoring.mp4 6MB
  45. ~Get Your Files Here !/4. Threat Modeling/6. Summary.mp4 6MB
  46. ~Get Your Files Here !/8. Service Mesh/5. Products and implementations.mp4 5MB
  47. ~Get Your Files Here !/8. Service Mesh/3. Anatomy of Service Mesh.mp4 5MB
  48. ~Get Your Files Here !/7. Microservices and Security/1. Security challenges with microservices.mp4 5MB
  49. ~Get Your Files Here !/1. Introduction/2. Who Is This Course For.mp4 3MB
  50. ~Get Your Files Here !/8. Service Mesh/1. Introduction to Service Mesh.mp4 3MB
  51. ~Get Your Files Here !/7. Microservices and Security/4. Securing microservices data.mp4 3MB
  52. ~Get Your Files Here !/10. Conclusion/1.1 Microservices Security Check List.pdf 299KB
  53. ~Get Your Files Here !/6. Application and Data Security/10.1 Application and Data Security Call to Action.pdf 58KB
  54. ~Get Your Files Here !/7. Microservices and Security/6.1 Microservices and Security Call to Action.pdf 55KB
  55. ~Get Your Files Here !/9. Logging and Monitoring/6.1 Logging and Monitoring Call to Action.pdf 51KB
  56. ~Get Your Files Here !/8. Service Mesh/7.1 Service Mesh Call to Action.pdf 49KB
  57. ~Get Your Files Here !/4. Threat Modeling/7.1 Threat Modeling Call to Action.pdf 45KB
  58. ~Get Your Files Here !/6. Application and Data Security/2. Authentication.srt 29KB
  59. ~Get Your Files Here !/6. Application and Data Security/7. Secure Code.srt 26KB
  60. ~Get Your Files Here !/10. Conclusion/3. Bonus Lecture.html 22KB
  61. ~Get Your Files Here !/6. Application and Data Security/5. Authorization.srt 20KB
  62. ~Get Your Files Here !/4. Threat Modeling/2. What is Threat Modeling.srt 19KB
  63. ~Get Your Files Here !/6. Application and Data Security/3. OAuth2 Protocol.srt 17KB
  64. ~Get Your Files Here !/9. Logging and Monitoring/3. Implementing Logging.srt 16KB
  65. ~Get Your Files Here !/7. Microservices and Security/2. Securing microservices network.srt 15KB
  66. ~Get Your Files Here !/6. Application and Data Security/8. Secure Data.srt 13KB
  67. ~Get Your Files Here !/2. Introduction to Microservices/4. Problems with Monolith and SOA.srt 13KB
  68. ~Get Your Files Here !/2. Introduction to Microservices/6. Problems solved by Microservices.srt 12KB
  69. ~Get Your Files Here !/7. Microservices and Security/3. Securing microservices identity.srt 12KB
  70. ~Get Your Files Here !/6. Application and Data Security/6. Secure Communication.srt 12KB
  71. ~Get Your Files Here !/1. Introduction/1. Course Introduction.srt 10KB
  72. ~Get Your Files Here !/8. Service Mesh/2. Problems solved by Service Mesh.srt 10KB
  73. ~Get Your Files Here !/5. Secure Architecture/4. Network Security.srt 9KB
  74. ~Get Your Files Here !/5. Secure Architecture/1. Secure Architecture Introduction.srt 9KB
  75. ~Get Your Files Here !/3. Introduction to Software Security/2. What is Software Security.srt 9KB
  76. ~Get Your Files Here !/2. Introduction to Microservices/3. Service Oriented Architecture.srt 8KB
  77. ~Get Your Files Here !/6. Application and Data Security/9. Logging and Monitoring.srt 7KB
  78. ~Get Your Files Here !/5. Secure Architecture/5. Platform Security.srt 7KB
  79. ~Get Your Files Here !/2. Introduction to Microservices/2. Monolith Applications.srt 7KB
  80. ~Get Your Files Here !/3. Introduction to Software Security/3. Software Security Terminology.srt 7KB
  81. ~Get Your Files Here !/2. Introduction to Microservices/5. Microservices to the rescue.srt 7KB
  82. ~Get Your Files Here !/8. Service Mesh/6. Service Mesh and security.srt 7KB
  83. ~Get Your Files Here !/3. Introduction to Software Security/4. Who is responsible for the Security.srt 6KB
  84. ~Get Your Files Here !/6. Application and Data Security/4. Authentication and the Architect.srt 5KB
  85. ~Get Your Files Here !/9. Logging and Monitoring/4. Implementing Monitoring.srt 5KB
  86. ~Get Your Files Here !/6. Application and Data Security/1. Introduction.srt 5KB
  87. ~Get Your Files Here !/7. Microservices and Security/5. External vs internal services.srt 5KB
  88. ~Get Your Files Here !/8. Service Mesh/4. Types of Service Mesh.srt 5KB
  89. ~Get Your Files Here !/9. Logging and Monitoring/5. Logging and Security.srt 5KB
  90. ~Get Your Files Here !/10. Conclusion/2. Conclusion.srt 5KB
  91. ~Get Your Files Here !/4. Threat Modeling/4. Threat Modeling Methodologies.srt 4KB
  92. ~Get Your Files Here !/4. Threat Modeling/5. Threat Modeling Tools.srt 4KB
  93. ~Get Your Files Here !/4. Threat Modeling/3. Conducting Threat Modeling.srt 4KB
  94. ~Get Your Files Here !/4. Threat Modeling/1. Introduction.srt 4KB
  95. ~Get Your Files Here !/5. Secure Architecture/3. Physical Security.srt 3KB
  96. ~Get Your Files Here !/5. Secure Architecture/2. The 5 Perimeters of Security.srt 3KB
  97. ~Get Your Files Here !/9. Logging and Monitoring/2. Logging vs Monitoring.srt 3KB
  98. ~Get Your Files Here !/8. Service Mesh/5. Products and implementations.srt 3KB
  99. ~Get Your Files Here !/1. Introduction/3. Agenda.srt 3KB
  100. ~Get Your Files Here !/8. Service Mesh/3. Anatomy of Service Mesh.srt 3KB
  101. ~Get Your Files Here !/9. Logging and Monitoring/1. Introduction to Logging and Monitoring.srt 3KB
  102. ~Get Your Files Here !/4. Threat Modeling/6. Summary.srt 2KB
  103. ~Get Your Files Here !/10. Conclusion/1. Download the microservices security checklist.srt 2KB
  104. ~Get Your Files Here !/2. Introduction to Microservices/1. Introduction.srt 2KB
  105. ~Get Your Files Here !/7. Microservices and Security/1. Security challenges with microservices.srt 2KB
  106. ~Get Your Files Here !/3. Introduction to Software Security/1. Introduction.srt 2KB
  107. ~Get Your Files Here !/1. Introduction/2. Who Is This Course For.srt 1KB
  108. ~Get Your Files Here !/8. Service Mesh/1. Introduction to Service Mesh.srt 1KB
  109. ~Get Your Files Here !/7. Microservices and Security/4. Securing microservices data.srt 1KB
  110. ~Get Your Files Here !/Bonus Resources.txt 357B
  111. ~Get Your Files Here !/4. Threat Modeling/7. Threat modeling call to action.html 317B
  112. ~Get Your Files Here !/7. Microservices and Security/6. Microservices and security call to action.html 279B
  113. ~Get Your Files Here !/6. Application and Data Security/10. Application and Data Security Call to Action.html 274B
  114. ~Get Your Files Here !/9. Logging and Monitoring/6. Logging and monitoring call to action.html 257B
  115. ~Get Your Files Here !/8. Service Mesh/7. Service mesh call to action.html 250B
  116. ~Get Your Files Here !/2. Introduction to Microservices/7. Test your knowledge Microservices.html 196B
  117. ~Get Your Files Here !/3. Introduction to Software Security/5. Test your knowledge of Software Security.html 196B
  118. ~Get Your Files Here !/4. Threat Modeling/8. Test your knowledge on Threat Modeling.html 196B
  119. ~Get Your Files Here !/5. Secure Architecture/6. Test your knowledge of Secure Architecture.html 196B
  120. ~Get Your Files Here !/6. Application and Data Security/11. Test your knowledge of application and data security.html 196B
  121. ~Get Your Files Here !/7. Microservices and Security/7. Test your knowledge of microservices security.html 196B
  122. ~Get Your Files Here !/8. Service Mesh/8. Test your knowledge of service mesh.html 196B
  123. ~Get Your Files Here !/9. Logging and Monitoring/7. Test your knowledge of logging and monitoring.html 196B
  124. Get Bonus Downloads Here.url 183B