- Business
- Esoteric
- Fitness & Gym
- Health
- Hypnosis
- Management
- Marketing & Selling
- Massage – SPA
- Parenting
- PUA Seduction
- Science
- Self Improvement
- Art
- Investing
- Painting & Skulping
- Tai Chi & Martial Arts
- Qigong
- Taoism
- Design & Graphics
- Medicine
- Exams
- Spirituality & Religion
- Hobbies & Fixing & Woodworking
- Photography & Film Making
- Networking & Lan
- Forex & Trading
- IQ & Memory
- Vision & Eye Care
- Swimming & Scuba diving & Water Sports
- Security & Hacking
- Travel
- Cooking
- Driving & Flighting
- Languages
- Computers & Programming
- Building & Home Improvement
- Music
- Astronomy
- History
- Mathematics
- Philosophy
- Literature & Writing
- Economics & Finance
- Sewing
- Hunting
- Electronics
- Psychology & Psychiatry
Description
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.59 GB | Duration: 10h 50m
Language: English | Size: 2.59 GB | Duration: 10h 50m
Spring Security, Authentication, Authorization, Users, Roles, CORs, CSRF, JWT, OAUTH2, OpenID Connect, KeyCloak
What you’ll learn
Spring Security framework details and it features.
How to adapt security for a Java web application using Spring Security
What is CSRF, CORS, JWT, OAUTH2
Applying authorization rules using roles, authorities inside a web application using Spring Security
Method level security in web/non-web applications
Requirements
Java
Basics of Spring framework
Description
‘Spring Security Zero to Master’ course will help in understanding the Spring Security Architecture, important packages, interfaces, classes inside it which handles authentication and authorization requests in the web applications. It also covers most common security related topics like CORs, CSRF, JWT, OAUTH2, password management, method level security, user, roles & authorities management inside web applications.
Below are the important topics that this course covers,
Spring Security framework details and it features
How to adapt security for a Java web application using Spring Security
Password Management in Spring Security with PasswordEncoders
Deep dive about encoding, encryption and hashing
What is CSRF, CORS and how to address them
What is Authentication and Authorization. How they are different from each other.
Securing endpoint URLs inside web applications using Ant, MVC & Regex Matchers
Filters in Spring Security and how to write own custom filters
Deep dive about JWT (JSON Web Tokens) and the role of them inside Authentication & Authorization
Deep dive about OAUTH2 and various grant type flows inside OAUTH2.
Deep dive about OpenID Connect & how it is related to OAUTH2
Applying authorization rules using roles, authorities inside a web application using Spring Security
Method level security in web/non-web applications
Social Login integrations into web applications
Set up of Authorization Server using KeyCloak
The pre-requisite for the course is basic knowledge of Java, Spring and interest to learn.
Who this course is for:
Beginner students who are learning Spring framework and interested in security as well
Developers who already know developing web applications using Spring framework
Java Architects
HOMEPAGE
https://anonymz.com/?https://www.udemy.com/course/spring-security-zero-to-master/
Reviews (0)
Only logged in customers who have purchased this product may leave a review.
Shipping & Delivery
DIGITAL DELIVERY ONLY
This is digital product THE DOWNLOAD LINK SEND 12-24 HOURS AFTER UPON PURSUASE AND PAYMENT CLEARS"
- The digital files are uploaded on PCLOUD
- 12-24 hours delivery time
- the download links expire after 7 days and need to download them
- to renew the download link after expiration have one additional fee $5 per product
REQUESTS
Also we accept requests (in this page) and course exchanges
In Course exchanges we are sending credits only
The credits will be the same price as we can sell course
"REFUNDS & RETURNS"
No Refunds on digital product
ONLY EXCHANGE
- Because of the abuse of the refunds from many customers i don't accept refunds
- We accept only 1 time exchange with product of the same price
- if you done mistake on the exchangeable product i don't recognize it as your mistake
- Exchanges only 3 days after the payment of your digital product. (if abused again i will do it 1 day)
Related products
Practical Buffer Overflows for OSCP
Ethical Hacking Training for Beginners v2.0
$5.00
Ultimate Ethical Hacking Course – Learn From Scratch
$5.00
Blackhat USA 2015
Chad Kimball – Live Black Hat Course
Getting Started with Reverse Engineering
$5.00
Reviews
There are no reviews yet.