Pluralsight – Securing Your Api Endpoints Codemash

Pluralsight – Securing Your Api Endpoints Codemash-NOLEDGE
English | Size: 136.54 MB
Category: Tutorial


CodeMash 2020 | Securing Your API Endpoints – A Practical Authentication Guide | Seth Petry-Johnson
It’s never been easier to expose services over HTTP. It’s also never been easier to inadvertently expose security holes via those same services. This session is designed for the average developer/architect that wants a brief overview of API security without getting into the weeds of cryptography or complex authentication frameworks. You’ll learn from Seth Petry-Johnson about OAuth, API Keys, HMAC, JSON Web Tokens (JWT), and more. Don’t worry if those things sound foreign; they’ll be explained in a clear, practical way so that you’ll be able to choose the appropriate tool for your specific needs.

PluralSight – Securing IIS Websites-REBAR

PluralSight – Securing IIS Websites-REBAR
English | Size: 365.03 MB
Category: Tutorial


In this course, Securing IIS Websites, you’ll gain the ability to secure your IIS Webservers and prevent attacks. First, you’ll explore how to reduce your attack surface to avoid attracting attackers to your site. Next, you’ll discover how to lock down IIS to prevent attacks from being successful. Finally, you’ll learn how to monitor your server to identify or prevent attacks from happening. When you’re finished with this course, you’ll have the skills and knowledge of IIS Security needed to keep your websites safe.

PluralSight – Securing The Docker Platform

PluralSight – Securing The Docker Platform-REBAR
English | Size: 498.98 MB
Category: Tutorial


Docker containers are in widespread use as the distribution vehicle for cloud native application services. An important enabler in the process of building, packaging, and running those containers is the Docker platform, which is comprised of several parts. In this course, Securing the Docker Platform, you’ll learn about the fundamental aspects of security that relate to the platform components. First, you’ll gain a better understanding of the platform components involved and the means of measuring compliance against an industry benchmark standard. Next, you’ll discover how to configure the Docker daemon for best practice security, as well as for more flexible access control and authentication. Finally, you’ll explore how to apply security controls to other aspects of the platform including a self-hosted Docker registry and a Swarm cluster. By the end of this course, you’ll have the necessary knowledge to configure, measure, and optimize effective Docker platform security.

PluralSight – Securing Applications In Microsoft Azure

PluralSight – Securing Applications In Microsoft Azure-REBAR
English | Size: 474.72 MB
Category: Tutorial


Manually maintaining code credentials and Azure resources’ security health is time-consuming and error-prone. In this course, Securing the Application Lifecycle in Microsoft Azure, you will gain the ability to use automated tools to uphold the security of your cloud subscription. First, you will discover how to use the CredScan tool to search your code for secrets and credentials before they accidentally get checked in. Next, you will learn to scan your Azure subscriptions for security health using the Secure DevOps Kit for Azure (AzSK). Finally, you will explore how to create automated load tests for your Azure app services. When you are finished with this course, you will have the skills and knowledge of secure application lifecycle needed to protect your applications in the cloud.