English | Size: 808.8 MB
Genre: eLearning
Discover how to create secure deployments of MongoDB for production-ready environments. In this course, Kirby Kohlmorgen shows how to use this document database’s native and third-party integration security features and resources to ensure the security of your MongoDB deployments. Kirby covers authentication mechanisms and methods, and dives into authorization and encryption, discussing built-in and user-defined roles, how to create and grant privileges to a role, and transport encryption. He also goes into auditing—including how to configure an audit from the command line—and security checklists and reports. By the end of this course, you’ll have the knowledge needed to deploy a secure MongoDB cluster, configure the role-based authorization model to your needs, set up encryption, do proper auditing, and follow security best practices.
This course was created by MongoDB University. We are pleased to host this training in our library.
Topics include:
Authentication vs. authorization
Authentication methods
Authorization and encryption
Role-based access control
Creating a sys admin
Granting new privileges to a role
Describing auditing capabilities
Enabling the first audit filter
Security checklists and reports
nitroflare.com/view/968898B12D7B8E4/LN-MongoDB-SecurityY.part1.rar
nitroflare.com/view/1FFC11A29A21724/LN-MongoDB-SecurityY.part2.rar
nitroflare.com/view/98564F61165CF26/LN-MongoDB-SecurityY.part3.rar
rapidgator.net/file/c0d7cd45403215e758bb89bc34685b75/LN-MongoDB-SecurityY.part1.rar.html
rapidgator.net/file/5afea2b61f9a86c8f75a35c18978662e/LN-MongoDB-SecurityY.part2.rar.html
rapidgator.net/file/43b7f2082d8c547a45f86257c9a3d672/LN-MongoDB-SecurityY.part3.rar.html
If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9