For business inquiries : (+1) 438 601-1155

For special requests : (+1) 438 601-1155

A propos de la formation Spring Security 5

Détails
Objectifs pédagogiques de la formation Spring Security 5
  • Understand the architecture and components of Spring Security
  • Configure Spring Security within Spring Boot for authentication and authorization
  • Implement multi-factor authentication using various methods such as basic-digest-HTTPS and 2FA
  • Secure user credentials and secrets to prevent unauthorized access
  • Integrate OAuth2 social login for outsourcing authentication
  • Add authorization to pages-URLs-methods and domain objects using security configuration and expressions.

Qui devrait suivre cette formation Spring Security 5 ?

Public visé par la formation Spring Security 5

This training course is designed for Java developers, software engineers, system architects, and security professionals who want to deepen their understanding of Spring Security and learn how to implement effective security measures in Java applications.

Prérequis de la formation Spring Security 5

Participants should have a solid understanding of Java programming and web application development concepts. Familiarity with Spring Boot and basic knowledge of authentication and authorization principles would be beneficial but not mandatory.

Formations Similaires

  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation Spring Security 5


Module 1: Introduction to Spring Security

Overview of Spring Security

Architecture and Components

Configuration with Spring Boot


Module 2: Spring Security Authentication

Spring Security Filter Chains

Authentication Methods (Basic, Digest)

Configuring Authentication

Web Application Penetration Testing


Module 3: Common Security Threats

Out-of-the-box Security Protection

HTTPS Implementation

Handling Man-in-the-Middle Attacks

Configuring HSTS and Public Key Pinning


Module 4: Securing User Credentials

Handling User Credentials

Password Encoding and Strength

Securing Secrets with Spring Cloud Vault


Module 5: Additional Authentication Layers

Email Verification

Two-factor Authentication

Remember-Me Authentication


Module 6: Outsourcing Authentication with OAuth2

Authentication with Spring Security OAuth2

Social Login Integration (Google, Facebook)


Module 7: Layering Authorization with Spring Security

Authorization Overview

Spring Expression Language

Securing URLs, Methods, and Domain Objects

Custom PermissionEvaluator Implementation

Formations Similaires
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Foire Aux Questions

Spring Security 5 is a powerful and comprehensive security framework for Java applications, developed by the Spring community. It provides authentication, authorization, and other security features to ensure robust protection against common security threats in web and enterprise applications.

Vous pouvez faire l’inscription ou la demande du devis avec un seul click