Spring Security LiveLessons (Video Training)

Spring Security LiveLessons (Video Training)

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 6h 18m | 3.41 GB

In Spring Security LiveLessons, learn from Spring experts Rob Winch, Spring Security project lead, and Josh Long, Spring developer advocate. Rob and Josh will teach you how to leverage both built-in and custom authentication and authorization in Spring Security. They also discuss the common exploits and how Spring Security can defend against them, how to easily test a Spring Security application, and how to properly design your code.

Learn How To

  • Leverage both built-in and custom authentication
  • Leverage both built-in and custom authorization
  • Use Spring Security to defend against common exploits
  • Easily test a Spring Security application
  • Properly design your code

Who Should Take This Course

  • Developers who know they need to address security upfront but struggle with how to do so
  • Developers who know they don’t know enough about security and would happily embrace industry-proven solutions to take the shortcut to production
  • Developers who want to level up their security practices and bring them to the modern age
Table of Contents

01 Spring Security – Introduction
02 Learning objectives
03 1.1 Things You’ll Need Java 8, an IDE, Maven, Spring Boot CLI
04 1.2 Dependency Injection
05 1.3 SpEL
06 1.4 Portable Service Abstractions
07 1.5 AOP
08 1.6 How Servlet Filter Works
09 1.7 Auto Config
10 Learning objectives
11 2.1 Creating Hello Security
12 2.2 What You Get Out of the Box
13 2.3 How it Works
14 2.4 What Spring Security Provides
15 Learning objectives
16 3.1 What is Authentication
17 3.2 In Memory Authentication
18 3.3 JDBC-Based Authentication
19 3.4 LDAP-Based Authentication
20 3.5 Login and Logout
21 3.6 Custom AuthenticationProviders
22 3.7 Custom UserDetailsServices
23 3.8 Password Encoding and Migration
24 3.9 Audit Events
25 Learning objectives
26 4.1 What is Authorization
27 4.2 Setting Up Our Sample Application
28 4.3 Configuring Web-Based Authorization
29 4.4 Understanding Web-Based Authorization
30 4.5 Actuator
31 Learning objectives
32 5.1 Cache Control
33 5.2 HTTPS
34 5.3 XSS
35 5.4 Content Sniffing
36 5.5 CSRF Protection
37 5.6 Session Fixation
38 5.7 Click Jacking
39 5.8 CSP
40 5.9 RFD Attacks
41 5.10 HttpFirewall
42 Learning objectives
43 6.1 Why Method Security
44 6.2 Creating Our Insecure Application
45 6.3 Integrating with Spring Security
46 6.4 JSR 250 Annotations
47 6.5 @Secured
48 6.6 @PreAuthorize_@PostAuthorize
49 6.7 Spring Data integration
50 Learning objectives
51 7.1 Introduction
52 7.2 Authenticating with OAuth2
53 7.3 Resource Server
54 7.4 WebClient Integration
55 7.5 Authorization Code Flow
56 Learning objectives
57 8.1 Test Method Security
58 8.2 Test Web Security with MockMvc
59 8.3 Test Web Security with HtmlUnit Integration
60 Spring Security – Summary