Practical Microservice Security

Practical Microservice Security

GOTO Conferences via YouTube Direct link

Types of threats

6 of 44

6 of 44

Types of threats

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Practical Microservice Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Who am I
  3. 3 Fundamentals
  4. 4 The monolith
  5. 5 The basics
  6. 6 Types of threats
  7. 7 Stack Overflow
  8. 8 WASP
  9. 9 Authentication Authorization
  10. 10 Microservices
  11. 11 Planning
  12. 12 Authorization
  13. 13 Publicfacing API
  14. 14 Tokenization
  15. 15 Input Validation
  16. 16 First Time Round
  17. 17 Application Security
  18. 18 Monster Microservice
  19. 19 Coupling
  20. 20 Its not your code
  21. 21 Orchestration layer
  22. 22 Tiny components
  23. 23 Is this worrying
  24. 24 We are incredibly lazy
  25. 25 Features that scare me
  26. 26 How do we do this
  27. 27 Challenge us
  28. 28 Principle of Least Privilege
  29. 29 Define Your Roles
  30. 30 Finegrained Permissions
  31. 31 Logging and Monitoring
  32. 32 Mutable Architecture
  33. 33 Compliance
  34. 34 Perspective
  35. 35 Security benefit
  36. 36 Languages
  37. 37 Tools
  38. 38 Interdependency
  39. 39 Puppy analogy
  40. 40 Logging
  41. 41 Denial of Service
  42. 42 Hacking Team
  43. 43 Logs
  44. 44 Wrap up

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.