Course Overview

Around 2014 microservices became a buzzword. Today, microservices is a dominant architecture style for building distributed systems. However, there is no consensual definition of what is a microservice, or what are the guiding principles for designing and implementing microservices. 

Microservices expose services that are visible on your intranet or the Internet (e.g., HTTP endpoints of public APIs). Moreover, they often communicate through messages that use text-based formats that carry data and metadata (e.g., JSON). The security of microservices becomes critical for protecting the privacy and integrity of your data and services. However, it is a challenging task, as it involves four different aspects:

  • Security of data communication
  • Authentication and authorization
  • Application development security 
  • Monitoring and observability

These four aspects sound generic. Microservice is an architecture style of the cloud computing and DevOps era. In addition, microservices usually run as docker containers in a container orchestration platform. In this course, we explain and discuss strategies and technologies to address these four aspects of microservice security in a technology scenario that involves the cloud, DevOps, and container orchestration. 

The main goal of the course is to provide an overarching description of security requirements and existing alternatives for microservice security. We want to help your team and your organization to create microservice architectures and to offer a runtime infrastructure for them that can address the most stringent security requirements.

What You Will Learn

  • What is a microservice in practice
  • the main types of services and technologies involved in creating and running microservices?
  • Strategies to provide authentication and authorization to microservices
  • What tools and practices should be used in CI/CD pipelines to check for vulnerabilities in your code base
  • docker images
  • and libraries?
  • Types of tools that can be used to help detect
  • resist
  • react to
  • and recover from attacks. These types of tools include service mesh
  • API gateway
  • application monitoring
  • and log consolidation.
  • Good practices to configure security for microservices in a Kubernetes cluster.

Program Curriculum

  • Course Introduction and Basic Service-related Concepts
  • Defining Microservice, Microservices in Practice
  • Benefits and Challenges of Microservices
  • Main Types of Microservices
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Microservice Security Challenges and How to Address Them
  • Security of Data Communication for REST Services
  • Additional Mechanisms to Protect Data Communication
  • API Gateway
  • Service Mesh
  • Chapter 2 Quiz

  • Core Concepts Related to Authentication
  • Core Concepts Related to Authorization
  • The JWT Standard
  • OAuth 2.0
  • Open ID Connect
  • Authentication and Authorization for REST Services with JWT
  • Authentication and Authorization for Asynchronous Services
  • Chapter 3 Quiz

  • Security in the Software Lifecycle
  • Awareness of Application Security
  • Analyzing the Application Code
  • Dependency Analysis
  • Docker Image Scanning
  • Infrastructure as Code Security
  • Secrets Management
  • Chapter 4 Quiz

  • Security Tools in a Microservice Runtime Infrastructure
  • Monitoring
  • Log Consolidation
  • Error Tracking and Distributed Tracing
  • Chapter 5 Quiz

  • Course Takeaways
  • Thank You and Contact Information
Load more modules

Instructor

Paulo Merson

Paulo Merson has been programming in the small and programming in the large for over 30 years. He's a dev at the Brazilian Federal Court of Accounts, adjunct faculty in the Masters of Software Engineering program at Carnegie Mellon University, and faculty in the University of Brasilia master's program in Applied Computing. He often delivers professional training to fellow devs in the US and Europe. His speaking experience also includes talks at DDD Europe, OOP, XP Agile, JavaOne, SPLASH/OOPSLA, SATURN, and lectures to grad students in different universities. Paulo holds a BSc in CS from the University of Brasilia and a Master of Software Engineering from Carnegie Mellon University.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8