Microservices Security
Security breaches can be very costly, from loss of revenue, reputational damage, and even bankruptcy. In this course, you will learn how to navigate the unique security challenges of a microservice architecture.
Microservices can provide a lot of flexibility and benefits to your application and organization. Security breaches can be very costly, from loss of revenue, reputational damage and possibly bankruptcy, hence it’s of utmost importance you get it right. In this course, Microservices Security Fundamentals, you will learn the best practices, principals, standards, and patterns to effectively design and implement security solutions for your desired microservices architecture. First, you will learn about the key challenges of securing microservices vs. traditional monolithic applications. Next, you will discover the various security patterns and techniques you can utilize to address these challenges, focusing on edge and service-service security, single page vs. multi-page applications, monitoring, alerting, and throttling. Finally, you will explore threat modeling techniques and how to foster a security culture within your microservices teams. When you finish this course, you will have the skills and knowledge to design and implement secure microservices required to protect your organization and users.
Author Name: Wojciech Lesniak
Author Description:
Wojciech is a Technical Lead and Scrum Master. He has over 15 years’ experience in software development working in a variety of industries from financial services and online gaming. He has extensive experience with anything Java, Spring framework, Microservices and has a passion for developing secure and scalable applications.
Table of Contents
- Course Overview
1min - Understanding the Complexities of Microservices Security
12mins - Securing the Perimeter around Your Microservices
43mins - Securing the Communication between Your Microservices
39mins - Securing the Communication between Your Microservices and Public Clients
13mins - Defense in Depth: Leveraging Security Patterns in Your Microservices Architecture
18mins - Monitoring and Throttling Your Microservices
16mins - Decoupling Security from Your Microservices with Service Mesh
10mins - Securely Developing and Deploying Your Microservices
15mins - Fostering a Security Culture within Your Microservices Teams
13mins
There are no reviews yet.