Spring Security Core: Beginner to Guru
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 3.66 GB
Genre: eLearning Video | Duration: 127 lectures (13 hour, 1 mins) | Language: English
Learn how to use Spring Security to Secure Your Spring Framework Applications
What you'll learn Homepage: https://www.udemy.com/course/spring-security-core-beginner-to-guru/
How to Secure Applications using Spring Security
How to Protect Against Common Web Security Vulnerabilities (OWASP)
Use Spring Security to Authenticate Application Users
Use Spring Security to Authorize User Actions
Password Management
Best Practices for Limiting User Access
Use Test Driven Development to Test User Access
Requirements
Must be comfortable with the Java programming language
Knowledgeable with the Spring Framework 5
Experienced with JUnit and Mockito
Understand Fundamentals of Web Applications
Knowledge of HTTP, Apache Maven, and SQL helpful
Description
Seems like everyday you can find a news story about a security breach, which can be devastating to companies.
Clearly, security is a very important topic.
The Spring Framework is the most popular Java framework for building cloud scale applications.
Spring Security provides you all the tools you need to secure your Java application.
Application security is much more than allowing access after checking a user name and password. You will learn how to limit what application features a user may or may not see. And also, how to limit what data a user may or may not see.
This course focuses on the core fundamentals of Spring Security.
Central to Spring Security is the process of Authentication. This is the process of establishing a user's identity.
Once a user's identity is established, the process of Authorization is used to allow the user to access specific actions and features of an application.
Spring Security has a very robust toolset for Authentication and Authorization.
Inside this course, you will master both.
You will start the course by learning how to leverage the auto-configuration capabilities of Spring Boot to quickly secure a web application using HTTP Basic Authentication.
Then, you'll be lead through a series of exercises, to replace and customize the default Spring Boot auto-configuration.
Through this process, you will understand the Spring Boot hidden 'magic', and learn how to master the configuration of Spring Security.
You will be working with a typical Spring Boot Web Application. The application mimics a robust monolithic application - with web pages and RESTful endpoints. This allows us to explore the unique security aspects unique to both web applications and RESTFul APIs.
You may notice there is not a dedicated section of the course about Testing Spring Security. This is because testing is done throughout the course.
Test Driven Development (TDD) is widely considered a best practice in software engineering.
As we explore the features of Spring Security, we will follow a TDD approach.
We will first write a failing test using JUnit 5, Mockito, and Spring MockMVC, then complete the lesson objective to get a passing test.
You will see some great examples of testing Spring with JUnit 5. However, it is recommended you have prior experience with JUnit 5.
Who this course is for:
Spring Framework Application Developers
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.