Instructors
Securing Java Web applications with Spring Security
Video Description
In this Securing Java Web Applications with Spring Security training course, expert author Kevin will teach you everything you need to know to secure Java web applications with Spring Security. This course is designed for users that already have a working knowledge of Java, XML, HTML, and JavaScript.
READ MOREYou will start with an introduction to Spring Security, then jump into learning the basics of Spring Security. From there, Kevin will teach you about authentication, including custom authentication, creating new user accounts, and user details. This video tutorial also covers JDBC authentication, LDAP authentication, authorization, and access control. Finally, you will learn advanced features, including HTTPS channel security and Java configuration.
Once you have completed this computer based training course, you will have learned how to provide authentication and authorization to Java web applications using Spring Security
LESSCourse Curriculum
Chapter 1: Course Overview | |||
1.Course Introduction – MongoDB | 00:06:15 | ||
2.About The Author | 00:02:00 | ||
Course Overview_Working files | 00:00:00 | ||
Chapter 2: Spring Security Introduction | |||
4.Overview | 00:00:52 | ||
5.Spring Security Features | 00:07:15 | ||
6.Security Principles | 00:07:36 | ||
7.Spring Tool Suite Installation | 00:03:06 | ||
8.Spring Tool Suite Configuration | 00:05:16 | ||
9.Course Project | 00:06:02 | ||
10.Spring Security Demonstration | 00:05:45 | ||
Spring Security Introduction_Working files | 00:00:00 | ||
Chapter 3: Spring Security Basics | |||
11.Overview | 00:03:06 | ||
12.Basic XML Configuration | 00:08:59 | ||
13.Fine Tuning Access Control | 00:06:20 | ||
14.HTTP Basic Authentication | 00:01:45 | ||
15.Custom Form Login | 00:07:18 | ||
16.Fine Tuning Form Login | 00:04:41 | ||
17.Post Login Concerns | 00:05:42 | ||
18.Logout | 00:05:49 | ||
Spring Security Basics_Working files | 00:00:00 | ||
Chapter 4: Authentication | |||
19.Overview | 00:04:28 | ||
20.Security Interceptor | 00:07:57 | ||
21.User Detail Service | 00:07:40 | ||
22.Security Context Holder | 00:05:10 | ||
23.User Details | 00:06:14 | ||
24.Creating New User Accounts | 00:06:44 | ||
25.Custom Authentication Provider | 00:07:03 | ||
26.Custom Authentication Object | 00:07:01 | ||
27.Custom Authentication | 00:08:02 | ||
Authentication_Working files | 00:00:00 | ||
Chapter 5: Jdbc Authentication | |||
28.Overview | 00:03:11 | ||
29.JDBC User details Manager | 00:06:19 | ||
30.Group Based Access Control | 00:07:13 | ||
31.Encoding Passwords | 00:05:46 | ||
32.Salting Hashes | 00:05:24 | ||
Jdbc Authentication_Working files | 00:00:00 | ||
Chapter 6: LDAP Authentication | |||
33.LDAP Authentication Overview | 00:03:20 | ||
34.LDAP Installation | 00:04:34 | ||
35.LDAP Configuration | 00:06:31 | ||
36.LDAP Authentication Provider | 00:08:26 | ||
37.User Details Context Mapper Part – 1 | 00:06:17 | ||
38.User Details Context Mapper Part – 2 | 00:07:18 | ||
39.Fine Tuning LDAP Configuration | 00:08:03 | ||
LDAP Authentication_Working files | 00:00:00 | ||
Chapter 7: Authorization | |||
40.Authorization_Overview | 00:04:25 | ||
41.Expression Based Configuration | 00:07:38 | ||
42.Authorize Tag | 00:08:50 | ||
43.Method Security With @Pre Authorize | 00:06:46 | ||
44.Method Security With @Post Authorize | 00:07:28 | ||
[email protected] Allowed | 00:04:17 | ||
[email protected] Filter | 00:06:18 | ||
[email protected] Filter | 00:04:17 | ||
Authorization_Working files | 00:00:00 | ||
Chapter 8: Access Control | |||
48.Access Control_Overview | 00:04:00 | ||
49.ACL Schema | 00:08:01 | ||
50.Adding ACL Entries | 00:08:56 | ||
51.ACL Configuration | 00:08:07 | ||
52.Integrating ACL Components | 00:07:20 | ||
Access Control_Working files | 00:00:00 | ||
Chapter 9: Advanced Features | |||
53.Advance Features_Overview | 00:03:27 | ||
54.HTTPS Channel Security | 00:06:32 | ||
55.CSRF Protection | 00:04:18 | ||
56.Authentication Tag | 00:03:20 | ||
57.Remember Me Authentication | 00:03:57 | ||
58.Java Configuration Part – 1 | 00:05:26 | ||
59.Java Configuration Part – 2 | 00:07:47 | ||
Advanced Features_Working files | 00:00:00 | ||
Chapter 10: Course Wrap Up | |||
60.Wrap Up | 00:04:25 |
Course Reviews
No Reviews found for this course.