Spring Security 6 Zero to Master along with JWT,OAUTH2
About Course
‘Spring Security Zero to Master’ course will help in understanding the Spring Security Architecture, important packages, interfaces, classes inside it which handles authentication and authorization requests in the web applications. It also covers most common security related topics like CORs, CSRF, JWT, OAUTH2, password management, method level security, user, roles & authorities management inside web applications.
Below are the important topics that this course covers,
- Spring Security framework details and it features
- How to adapt security for a Java web application using Spring Security
- Password Management in Spring Security with PasswordEncoders
- Deep dive about encoding, encryption and hashing
- What is CSRF, CORS and how to address them
- What is Authentication and Authorization. How they are different from each other.
- Securing endpoint URLs inside web applications using Ant, MVC & Regex Matchers
- Filters in Spring Security and how to write own custom filters
- Deep dive about JWT (JSON Web Tokens) and the role of them inside Authentication & Authorization
- Deep dive about OAUTH2 and various grant type flows inside OAUTH2.
- Deep dive about OpenID Connect & how it is related to OAUTH2
- Applying authorization rules using roles, authorities inside a web application using Spring Security
- Method level security in web/non-web applications
- Social Login integrations into web applications
- Set up of Authorization Server using KeyCloak
What Will You Learn?
- Spring Security framework details and it features.
- How to adapt security for a Java web application using Spring Security
- What is CSRF, CORS, JWT, OAUTH2
- Applying authorization rules using roles, authorities inside a web application using Spring Security
- Method level security in web/non-web applications
Course Content
Subtitle Guide – Hướng dẫn thêm phụ đề
01 – Getting Started
-
-
07:32
-
03:59
-
-
07:07
-
11:44
-
06:42
-
04:46
-
04:34
-
05:06
-
10:24
-
11:18
-
04:50
-
04:11
02 – Changing the default security configurations
-
-
05:42
-
03:08
-
07:33
-
05:57
-
07:18
-
-
06:50
-
04:35
-
04:47
03 – Defining & Managing Users
-
-
04:18
-
09:37
-
05:23
-
08:51
-
12:00
-
04:52
-
12:06
-
13:13
-
08:35
-
11:18
-
05:02
-
08:55
-
09:54
-
13:53
04 – Password Management with PasswordEncoders
-
-
08:45
-
06:34
-
10:07
-
03:01
-
04:48
-
09:05
-
06:16
-
07:56
-
09:44
05 – Understanding Authentication Provider and Implementing it
-
-
04:32
-
07:10
-
08:15
-
08:50
-
02:37
06 – Understanding CORs & CSRF
-
-
09:42
-
13:33
-
09:42
-
09:30
-
03:53
-
05:42
-
03:53
-
05:50
-
07:17
-
05:33
-
05:26
-
05:56
-
05:11
-
20:23
-
09:46
07 – Understanding & Implementing Authorization
-
-
05:57
-
07:10
-
05:32
-
09:38
-
03:14
-
06:31
-
04:06
-
02:38
-
05:30
08 – Writing our own Custom Filters in Spring Security
-
-
04:56
-
07:29
-
04:20
-
08:54
-
05:53
-
05:34
-
07:01
09 – Token based Authentication using JSON Web Token (JWT)
-
-
03:44
-
08:21
-
06:30
-
08:50
-
06:15
-
08:27
-
08:16
-
02:54
-
05:41
-
02:58
10 – Method Level Security
-
-
05:44
-
08:22
-
05:50
-
03:27
-
03:37
-
07:45
-
04:19
11 – Deep dive of OAUTH2 & OpenID Connect
-
-
11:03
-
06:30
-
04:54
-
06:04
-
06:35
-
09:36
-
05:50
-
05:24
-
04:23
-
03:31
-
06:18
-
02:54
-
10:21
12 – Implementing OAUTH2 using spring security
13 – Implementing OAUTH2 style login inside EazyBank using KeyCloak
-
-
02:21
-
04:42
-
04:21
-
02:00
-
04:47
-
14:19
-
07:54
-
04:57
-
02:42
-
03:57
-
09:03
-
09:27
-
06:28
-
03:07
-
08:31
-
08:01
-
05:51
-
07:36
-
05:27