Spring Security Fundamentals

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Spring Security Fundamentals Are you a Spring Boot developer interested in learning spring security in detail then this course is for you. Are you an experienced spring developer who wants to use OAuth, JWT, and more to secure your web and REST microservices then this course is for you as well?

Security is a very important aspect of every application. Looking at any java/spring developer job posting you will see OAuth, JWT, and more. This course is designed for experienced as well as complete beginners to learn and use spring security.

You will start this course by learning what and why we should Spring Security. You will

  1. Master the fundamentals of Security
  2. Learn what and why we should use Spring Security
  3. Learn the Architectural Component of Spring Security flow
  4. Understand the Authentication and Authorisation flow
  5. Secure a Web Application using inbuilt components
  6. Secure the Web Application using custom components
  7. Learn the concepts of OAuth
  8. See OAuth in Action
  9. Create OAuth Client Applications
  10. Configure JSON Web Tokens JWT
  11. CORS CSRF and more in easy steps

Who this Spring Security Fundamentals course is for:

  1. Students who want to master spring security fundamentals
  2. Students with knowledge of spring boot
  3. Students who have taken my spring boot or full-stack courses
Show More

What Will You Learn?

  • Master the fundamentals of Security
  • Learn what and why we should use Spring Security
  • Learn the Architectural Component of Spring Security flow
  • Understand the Authentication and Authorization flow
  • Secure a Web Application using in built components
  • Secure the Web Application using custom components
  • Learn the concepts of OAuth
  • See OAuth in Action
  • Create OAuth Client Applications
  • Configure JSON Web Tokens JWT
  • CORS CSRF and more in easy steps

Course Content

Spring Security Fundamentals

  • Lesson 1 – The basic contracts in Spring Security architecture
    00:00
  • Lesson 19 – Configuring the authorization server to expose the public key
    00:00
  • Lesson 20 – Using Keycloak as an authorization server
    00:00
  • Lesson 21 – Using the Spring Security DSL method to create the Resource Server
    00:00
  • Lesson 22 – Implementing Single Sign On (SSO)
    00:00
  • Lesson 23 – Configuring endpoint authorization
    00:00
  • Lesson 24 – Authorities, Roles and Matcher methods
    00:00
  • Lesson 25 – MVC matchers and ANT matchers
    00:00
  • Lesson 26 – Endpoint authorization rules for an OAuth 2 resource server
    00:00
  • Lesson 27 – Method authorization configurations
    00:00
  • Lesson 28 – Preauthorization, postauthorization, prefiltering and postfiltering
    00:00
  • Lesson 29 – Using permissions
    00:00
  • Lesson 30 – @Secured and @RolesAllowed
    00:00
  • Lesson 31 – Securing reactive apps
    00:00
  • Lesson 32 – Building an OAuth 2 reactive resource server
    00:00
  • Lesson 18 – Using asymmetric key pairs with JWT
    00:00
  • Lesson 17 – Using symmetric keys with JWT
    00:00
  • Lesson 16 – Using non-opaque tokens in Spring Security with JWT
    00:00
  • Lesson 2 – Implementing the UserDetailsService
    00:00
  • Lesson 3 – UserDetailsManager and PasswordEncoder
    00:00
  • Lesson 4 – The AuthenticationProvider
    00:00
  • Lesson 5 – The filter chain
    00:00
  • Lesson 6 – Multiple Authentication Providers Part 1
    00:00
  • Lesson 7 – Multiple Authentication Providers Part 2
    00:00
  • Lesson 8 – The Security Context
    00:00
  • Lesson 9 – (Cross-Site Request Forgery) CSRF
    00:00
  • Lesson 10 – (Cross-Origin Resource Sharing) CORS
    00:00
  • Lesson 11 – OAuth 2 and Spring Security
    00:00
  • Lesson 12 – Deeply understanding the grant types
    00:00
  • Lesson 13 – Token implementations in OAuth 2 systems
    00:00
  • Lesson 14 – Using Opaque Tokens – Introspection
    00:00
  • Lesson 15 – Using Opaque Tokens – Blackboarding
    00:00
  • Lesson 33 – Integration testing for Spring Security implementations
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet