Securing Microservices in AspNetCore World(netcore5)
- Development
- Feb 19, 2025

Securing Microservices in AspNetCore World(netcore5), available at $54.99, has an average rating of 4.43, with 41 lectures, based on 7 reviews, and has 129 subscribers.
You will learn about Developing Secure Microservices using AspNetCore5 and IdentityServer4 This course is ideal for individuals who are Developers curious about microservices and how to secure them It is particularly useful for Developers curious about microservices and how to secure them.
Enroll now: Securing Microservices in AspNetCore World(netcore5)
Summary
Title: Securing Microservices in AspNetCore World(netcore5)
Price: $54.99
Average Rating: 4.43
Number of Lectures: 41
Number of Published Lectures: 41
Number of Curriculum Items: 41
Number of Published Curriculum Objects: 41
Original Price: $39.99
Quality Status: approved
Status: Live
What You Will Learn
Who Should Attend
Target Audiences
This course is a very detailed course which is unique in the sense that it covers all aspects of security and user management in the microservices world.
What you will learn in this course specifically as follows:
You will learn how to develop applications using AspNet Core 5 and ORM tool Entityframeworkcore 5
You will learn how a code-first approach is used to create databases and its tables corresponding to your model classes.
How to develop simple microservices applications and secure them with specific protocols.
Learn the two important security protocols (OAuth2 and OpenId Connect) used nowadays in microservices architectures
You will learn how to add the latest state-of the art security mechanism called PKCE to enhance the security of your apps.
How to secure microservices with a state of the art Centralized Authorization Server which implements the above two security protocols
How to make microservices communicate with each other either using direct call over the wire by HttpClient.
How to build User Management additions into the Authorization Server with role based authorization
How to use RabbitMq and Masstransit for communication between microservices over messaging without tight coupling
How to incorporate Serilog logging into the Authorization Server for better and structured logging onto the console.(You can extend the same functionality into the other microservices by following the same procedure)
How to use the new Microsoft technology Tool Microsoft Tye for easy development and deployment of microservices
Learn to use Microsoft Tye’s service discovery functionality
Learn to use the dashboard that Microsoft Tye provides automatically for observing the elements(microservices, db servers etc.) of the application and the logs created automatically
Learn to use tye.yaml file structure that replaces docker-compose.yaml files for microservices orchestration.
Every detail towards our final goal is shown and explained in clear terms during the course.
I hope you buy the course and enter into the world of safeguarding your applications with the best technology and tools available out there.
Course Curriculum
Chapter 1: Course Intro
Lecture 1: Course Introduction-General
Chapter 2: Security in Microservices World
Lecture 1: Applicaion Overview
Lecture 2: Application Infrastructure
Lecture 3: Tools&Pre-requisites
Chapter 3: Why is a Centralized Security Structure Needed?
Lecture 1: Need For Centralized Security Server
Lecture 2: Discussion On OpenID Connect and OAuth2 Protocoles
Lecture 3: Client Types
Lecture 4: End-Points We Should Know That Belong to the Protocoles
Lecture 5: QUIZZ VIDEO FOR CHAPTER 2
Chapter 4: IMPLEMENTING A CENTRALIZED AUTHORIZATION SERVER
Lecture 1: Discussion On JWT (Json Web Tokens) Structure
Lecture 2: Creating a Blank AuthServer project and Starting to Configure AuthServer
Lecture 3: AuthServer test with Resource Owner Password Grant Type using Postman as client
Lecture 4: Adding UI to AuthServer Microservice Project
Chapter 5: Building Our JobsApi WebApi That Needs Protection
Lecture 1: JobsApi-1
Lecture 2: JobsApi-2
Lecture 3: JobsApi-3
Lecture 4: JobsApi-4
Chapter 6: Protecting JobsApi
Lecture 1: Authorization Server and JobsApi Modification
Lecture 2: Client Credentials Grant Flow test with JobsApi, AuthServer and Postman
Lecture 3: Inspecting Claims and using ResourceOwnerPassword Credentials
Chapter 7: Creating and Building MvcWebClient Project
Lecture 1: MvcWebClientProject-1
Lecture 2: MvcWebClientProject-2
Lecture 3: MvcWebClientProject-3-Testing
Chapter 8: SECURING MVC WEB CLIENT PROJECT
Lecture 1: SecuringMvcWebClientProject-Introduction
Lecture 2: Authorization Code Flow Steps
Lecture 3: Configuring AuthServer adding the MvcWeb Client for Authorization Code Flow
Lecture 4: Configuring the Mvc Web Client for Authorization Code Flow
Lecture 5: Testing the Mvc Web Client Project Security
Lecture 6: Testing the Mvc Web Client Project Security with PKCE Added
Lecture 7: Logging-in and Logging-out from Projects
Lecture 8: Creating Additional Claims
Lecture 9: Role-Based Authorization- Mvc Web Project
Lecture 10: Securing Mvc Web Client and JobsApi Together-Role Based Authorization
Chapter 9: Section 9- MIGRATING AUTHSERVER CONFIGURATION TO DATABASE
Lecture 1: Setting up the AuthServer microservice for Configuration Migration
Chapter 10: Section 10-ASPNET CORE IDENTITY INTEGRATION WITH AUTHSERVER
Lecture 1: Integrating the AspNetCoreIdentity with AuthServer
Chapter 11: Section 11-HOW TO SEED USERS IN THE IDENTITY TABLES OF THE IDENTITY DATABASE
Lecture 1: Seeding of some Initial users in the Identity Database tables
Chapter 12: SECTION 12- USER REGISTRATION WITH ASP.NET CORE IDENTITY
Lecture 1: User Registration
Chapter 13: SEECTION 13- FORGOT PASSWORD
Lecture 1: Adding ForgotPassword Functionality
Chapter 14: 14- RESET PASSWORD FUNCTIONALITY
Lecture 1: Reset Password Implementation
Chapter 15: 15- FORGOTPASSWORD-RESETPASSWORD DEMO
Lecture 1: Running the projects and observing the result of the implementation
Chapter 16: Section 16- EMAIL CONFIRMATION IMPLEMENTATION
Lecture 1: Email Configuration
Instructors

F. Frank Ozz
Software Architect, Author
Rating Distribution
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
- Random Picks
- Popular
- Hot Reviews
- Investing in Canada - Free preview
- Professional Diploma in Digital Marketing™
- Advanced Photoshop Manipulations Tutorials Bundle
- Life Insurance Annuity Ultimate Buyer’s Guide
- Crypto Trading Mastery (Scalping, Day trading, price action)
- Company Valuation Financial Modeling
- How to Draw Cute Thanksgiving!
- Dibuja y Esculpe tu COVID para Impresión 3d en Blender 2.8X
- 1YouTube Masterclass The Best Guide to YouTube Success
- 2Photoshop CC- Adjustement Layers, Blending Modes Masks
- 3Personal Finance
- 4SolidWorks Essential Training ( 2023 2024 )
- 5The Architecture of Oscar Niemeyer
- 6Advanced Photoshop Manipulations Tutorials Bundle
- 7Polymer Clay Jewelry Making Techniques for Beginners
- 8How To Market Your Book Grow Your Mailing List
- 1Linux Performance Monitoring Analysis Hands On !!
- 2Content Writing Mastery 1- Content Writing For Beginners
- 3Media Training for PrintOnline Interviews-Get Great Quotes
- 4Learn Facebook Ads from Scratch Get more Leads and Sales
- 5The Complete Digital Marketing Course Learn From Scratch
- 6C#- Start programming with C# (for complete beginners)
- 7[FREE] How to code 10 times faster with Emmet
- 8Driving Results through Data Storytelling