riversongs Posted March 6 Report Share Posted March 6 Free Download Udemy - Practical Security Architecture - Hands On!Published: 3/2025MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHzLanguage: English | Size: 2.60 GB | Duration: 2h 52mHands-on Security Architecture: Building Secure, Reliable Systems following the industry best practicesWhat you'll learnImplement identity management using KeycloakSecure communications with HTTPS and digital certificatesUtilize JWT for secure token managementConfigure reverse proxy and sidecar for optimized traffic flowEnforce policies and permissions with OPADeploy OWASP ModSecurity as an effective web application firewallApply security patterns and best practices to design robust architecturesIntegrate multiple technologies to build secure, reliable systems in real-world environmentsRequirementsSome development knowledge is requiredNo security background is requiredDescriptionStep into the world of distributed systems with our hands-on course that equips you with the skills and knowledge you need to build secure and reliable systems and act as a security architect. Tackle core challenges such as authentication, authorization, and secure communication while leveraging industry-standard technologies and patterns that prepare you for today's dynamic threat landscape.In this course, you'll get your hands dirty with real-world tools like Keycloak for authentication and OPA for precise policy enforcement. Master secure communication and traffic management using Nginx, and become adept at detecting and mitigating threats with OWASP CRS and ModSecurity. You'll integrate JWT for secure token management, Sidecar for modular architecture, and Reverse Proxy for efficient traffic handling. Plus, you'll implement secure protocols with digital certificates and HTTPS to ensure data integrity and privacy.In this course, you will learn how to:• Authenticate and verify identities using Keycloak as your identity provider.• Control access with precision using OPA for policy enforcement.• Secure communications and manage network traffic with Nginx acting as both the reverse proxy and sidecar.• Detect and mitigate threats with OWASP CSR for robust threat detection rules and OWASP ModSecurity as your first line of defense.• Integrate essential security patterns such as JWT for secure token management, Sidecar for modular architecture, and Reverse Proxy for efficient traffic handling.• Implement secure protocols with digital certificates and HTTPS to ensure data integrity and privacy.With our hands-on approach, every module empowers you to apply these techniques directly in real-world environments. This course is ideal for software developers, security professionals, architects, and anyone interested in designing and implementing secure systems.Elevate your expertise in security architecture by engaging with interactive labs and exercises that transform theoretical concepts into deployable solutions.OverviewSection 1: IntroductionLecture 1 The course architectureLecture 2 Source codeSection 2: AuthenticationLecture 3 Opensource Identity provider (Introduction)Lecture 4 Keycloak set upLecture 5 OIDC flowLecture 6 Authentication GatewayLecture 7 Nginx with JavascriptLecture 8 Service Authentication and client credentialsLecture 9 Enforce authentication with JWT tokenSection 3: JSON Web tokens(JWT)Lecture 10 JWT token AnatomyLecture 11 Ways of validate JWT tokensLecture 12 JWT token validation codeSection 4: Digital Certifcate managementLecture 13 How Secure Connections (HTTPS) worksLecture 14 Managing Digital CertificatesLecture 15 Generate Service certificatesLecture 16 Packaging certs into Trust storesSection 5: Transport Layer Security(TLS)Lecture 17 Set up secure connectionsLecture 18 Identity verification with SidecarsLecture 19 Mutual TLSLecture 20 Route app requests to the sidecar with IptablesSection 6: ApplicationLecture 21 Containarize the app service and the sidecarSection 7: AuthorizationLecture 22 Service authorisation based on certsLecture 23 Open Policy Agent introductionLecture 24 Implementing Authorisation with OPASection 8: Web Application FirewallLecture 25 OWASP ModSecurity introductionLecture 26 Set up WAF with NginxSoftware engineers,Security ArchitectsHomepage: https://www.udemy.com/course/practical-security-architecture-hands-on/ Rapidgator Links Downloadhttps://rg.to/file/cc5da6c19c4b8cde2757705a8152ce98/rnbfh.Practical.Security.Architecture..Hands.On.part1.rar.htmlhttps://rg.to/file/4b5a09c196b9a431c85615c604a32bc4/rnbfh.Practical.Security.Architecture..Hands.On.part2.rar.htmlhttps://rg.to/file/10c64b2b10f60350929b2295cd58f1c8/rnbfh.Practical.Security.Architecture..Hands.On.part3.rar.htmlFikper Links Downloadhttps://fikper.com/kBnATwSuvX/rnbfh.Practical.Security.Architecture..Hands.On.part1.rar.htmlhttps://fikper.com/VIGGaNWjKq/rnbfh.Practical.Security.Architecture..Hands.On.part2.rar.htmlhttps://fikper.com/HoR9CoLrDo/rnbfh.Practical.Security.Architecture..Hands.On.part3.rar.html:No Password - Links are Interchangeable Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now