Securing Microservices in AspNetCore World(netcore5)
Securing Microservices in AspNetCore World(netcore5), available at $54.99, has an average rating of 4.43, with 41 lectures, based on 7 reviews, and has 129 subscribers.
You will learn about Developing Secure Microservices using AspNetCore5 and IdentityServer4 This course is ideal for individuals who are Developers curious about microservices and how to secure them It is particularly useful for Developers curious about microservices and how to secure them.
Enroll now: Securing Microservices in AspNetCore World(netcore5)
Summary
Title: Securing Microservices in AspNetCore World(netcore5)
Price: $54.99
Average Rating: 4.43
Number of Lectures: 41
Number of Published Lectures: 41
Number of Curriculum Items: 41
Number of Published Curriculum Objects: 41
Original Price: $39.99
Quality Status: approved
Status: Live
What You Will Learn
- Developing Secure Microservices using AspNetCore5 and IdentityServer4
Who Should Attend
- Developers curious about microservices and how to secure them
Target Audiences
- Developers curious about microservices and how to secure them
This course is a very detailed course which is unique in the sense that it covers all aspects of security and user management in the microservices world.
What you will learn in this course specifically as follows:
You will learn how to develop applications using AspNet Core 5 and ORM tool Entityframeworkcore 5
You will learn how a code-first approach is used to create databases and its tables corresponding to your model classes.
How to develop simple microservices applications and secure them with specific protocols.
Learn the two important security protocols (OAuth2 and OpenId Connect) used nowadays in microservices architectures
You will learn how to add the latest state-of the art security mechanism called PKCE to enhance the security of your apps.
How to secure microservices with a state of the art Centralized Authorization Server which implements the above two security protocols
How to make microservices communicate with each other either using direct call over the wire by HttpClient.
How to build User Management additions into the Authorization Server with role based authorization
How to use RabbitMq and Masstransit for communication between microservices over messaging without tight coupling
How to incorporate Serilog logging into the Authorization Server for better and structured logging onto the console.(You can extend the same functionality into the other microservices by following the same procedure)
How to use the new Microsoft technology Tool Microsoft Tye for easy development and deployment of microservices
Learn to use Microsoft Tye’s service discovery functionality
Learn to use the dashboard that Microsoft Tye provides automatically for observing the elements(microservices, db servers etc.) of the application and the logs created automatically
Learn to use tye.yaml file structure that replaces docker-compose.yaml files for microservices orchestration.
Every detail towards our final goal is shown and explained in clear terms during the course.
I hope you buy the course and enter into the world of safeguarding your applications with the best technology and tools available out there.
Course Curriculum
Chapter 1: Course Intro
Lecture 1: Course Introduction-General
Chapter 2: Security in Microservices World
Lecture 1: Applicaion Overview
Lecture 2: Application Infrastructure
Lecture 3: Tools&Pre-requisites
Chapter 3: Why is a Centralized Security Structure Needed?
Lecture 1: Need For Centralized Security Server
Lecture 2: Discussion On OpenID Connect and OAuth2 Protocoles
Lecture 3: Client Types
Lecture 4: End-Points We Should Know That Belong to the Protocoles
Lecture 5: QUIZZ VIDEO FOR CHAPTER 2
Chapter 4: IMPLEMENTING A CENTRALIZED AUTHORIZATION SERVER
Lecture 1: Discussion On JWT (Json Web Tokens) Structure
Lecture 2: Creating a Blank AuthServer project and Starting to Configure AuthServer
Lecture 3: AuthServer test with Resource Owner Password Grant Type using Postman as client
Lecture 4: Adding UI to AuthServer Microservice Project
Chapter 5: Building Our JobsApi WebApi That Needs Protection
Lecture 1: JobsApi-1
Lecture 2: JobsApi-2
Lecture 3: JobsApi-3
Lecture 4: JobsApi-4
Chapter 6: Protecting JobsApi
Lecture 1: Authorization Server and JobsApi Modification
Lecture 2: Client Credentials Grant Flow test with JobsApi, AuthServer and Postman
Lecture 3: Inspecting Claims and using ResourceOwnerPassword Credentials
Chapter 7: Creating and Building MvcWebClient Project
Lecture 1: MvcWebClientProject-1
Lecture 2: MvcWebClientProject-2
Lecture 3: MvcWebClientProject-3-Testing
Chapter 8: SECURING MVC WEB CLIENT PROJECT
Lecture 1: SecuringMvcWebClientProject-Introduction
Lecture 2: Authorization Code Flow Steps
Lecture 3: Configuring AuthServer adding the MvcWeb Client for Authorization Code Flow
Lecture 4: Configuring the Mvc Web Client for Authorization Code Flow
Lecture 5: Testing the Mvc Web Client Project Security
Lecture 6: Testing the Mvc Web Client Project Security with PKCE Added
Lecture 7: Logging-in and Logging-out from Projects
Lecture 8: Creating Additional Claims
Lecture 9: Role-Based Authorization- Mvc Web Project
Lecture 10: Securing Mvc Web Client and JobsApi Together-Role Based Authorization
Chapter 9: Section 9- MIGRATING AUTHSERVER CONFIGURATION TO DATABASE
Lecture 1: Setting up the AuthServer microservice for Configuration Migration
Chapter 10: Section 10-ASPNET CORE IDENTITY INTEGRATION WITH AUTHSERVER
Lecture 1: Integrating the AspNetCoreIdentity with AuthServer
Chapter 11: Section 11-HOW TO SEED USERS IN THE IDENTITY TABLES OF THE IDENTITY DATABASE
Lecture 1: Seeding of some Initial users in the Identity Database tables
Chapter 12: SECTION 12- USER REGISTRATION WITH ASP.NET CORE IDENTITY
Lecture 1: User Registration
Chapter 13: SEECTION 13- FORGOT PASSWORD
Lecture 1: Adding "ForgotPassword" Functionality
Chapter 14: 14- RESET PASSWORD FUNCTIONALITY
Lecture 1: Reset Password Implementation
Chapter 15: 15- FORGOTPASSWORD-RESETPASSWORD DEMO
Lecture 1: Running the projects and observing the result of the implementation
Chapter 16: Section 16- EMAIL CONFIRMATION IMPLEMENTATION
Lecture 1: Email Configuration
Instructors
-
F. Frank Ozz
Software Architect, Author
Rating Distribution
- 1 stars: 0 votes
- 2 stars: 0 votes
- 3 stars: 0 votes
- 4 stars: 5 votes
- 5 stars: 2 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Language Learning Courses to Learn in November 2024
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024