Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt
Courses2024

Udemy - Practical Security Architecture - Hands On!

Rekomendowane odpowiedzi

b37671e7f20bbbe0bbc3226500dc1ed0.avif
Free Download Udemy - Practical Security Architecture - Hands On!
Published: 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.60 GB | Duration: 2h 52m
Hands-on Security Architecture: Building Secure, Reliable Systems following the industry best practices

What you'll learn
Implement identity management using Keycloak
Secure communications with HTTPS and digital certificates
Utilize JWT for secure token management
Configure reverse proxy and sidecar for optimized traffic flow
Enforce policies and permissions with OPA
Deploy OWASP ModSecurity as an effective web application firewall
Apply security patterns and best practices to design robust architectures
Integrate multiple technologies to build secure, reliable systems in real-world environments
Requirements
Some development knowledge is required
No security background is required
Description
Step into the world of distributed systems with our hands-on course that equips you with the skills and knowledge you need to build secure and reliable systems and act as a security architect. Tackle core challenges such as authentication, authorization, and secure communication while leveraging industry-standard technologies and patterns that prepare you for today's dynamic threat landscape.In this course, you'll get your hands dirty with real-world tools like Keycloak for authentication and OPA for precise policy enforcement. Master secure communication and traffic management using Nginx, and become adept at detecting and mitigating threats with OWASP CRS and ModSecurity. You'll integrate JWT for secure token management, Sidecar for modular architecture, and Reverse Proxy for efficient traffic handling. Plus, you'll implement secure protocols with digital certificates and HTTPS to ensure data integrity and privacy.In this course, you will learn how to:• Authenticate and verify identities using Keycloak as your identity provider.• Control access with precision using OPA for policy enforcement.• Secure communications and manage network traffic with Nginx acting as both the reverse proxy and sidecar.• Detect and mitigate threats with OWASP CSR for robust threat detection rules and OWASP ModSecurity as your first line of defense.• Integrate essential security patterns such as JWT for secure token management, Sidecar for modular architecture, and Reverse Proxy for efficient traffic handling.• Implement secure protocols with digital certificates and HTTPS to ensure data integrity and privacy.With our hands-on approach, every module empowers you to apply these techniques directly in real-world environments. This course is ideal for software developers, security professionals, architects, and anyone interested in designing and implementing secure systems.Elevate your expertise in security architecture by engaging with interactive labs and exercises that transform theoretical concepts into deployable solutions.
Overview
Section 1: Introduction
Lecture 1 The course architecture
Lecture 2 Source code
Section 2: Authentication
Lecture 3 Opensource Identity provider (Introduction)
Lecture 4 Keycloak set up
Lecture 5 OIDC flow
Lecture 6 Authentication Gateway
Lecture 7 Nginx with Javascript
Lecture 8 Service Authentication and client credentials
Lecture 9 Enforce authentication with JWT token
Section 3: JSON Web tokens(JWT)
Lecture 10 JWT token Anatomy
Lecture 11 Ways of validate JWT tokens
Lecture 12 JWT token validation code
Section 4: Digital Certifcate management
Lecture 13 How Secure Connections (HTTPS) works
Lecture 14 Managing Digital Certificates
Lecture 15 Generate Service certificates
Lecture 16 Packaging certs into Trust stores
Section 5: Transport Layer Security(TLS)
Lecture 17 Set up secure connections
Lecture 18 Identity verification with Sidecars
Lecture 19 Mutual TLS
Lecture 20 Route app requests to the sidecar with Iptables
Section 6: Application
Lecture 21 Containarize the app service and the sidecar
Section 7: Authorization
Lecture 22 Service authorisation based on certs
Lecture 23 Open Policy Agent introduction
Lecture 24 Implementing Authorisation with OPA
Section 8: Web Application Firewall
Lecture 25 OWASP ModSecurity introduction
Lecture 26 Set up WAF with Nginx
Software engineers,Security Architects

Homepage:

Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.








Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

No Password - Links are Interchangeable

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

    • 1 Posts
    • 6 Views
    • 1 Posts
    • 4 Views
    • 1 Posts
    • 5 Views
    • 1 Posts
    • 7 Views

×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.