O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Service Oriented Architecture pt. 3

Video Description

SOA: Service Orientated Architecture part 3 This training has been created to provide you with relevant and important information concerning SOA: Service Orientated Architecture. During this training we will be concentrating on the main points of applying design strategies to a service orientated architecture. You will also learn all there is to know about SOA, how to design and apply the best principles, tips and techniques with detailed practices and principles. We will also be covering various aspects of legacy systems and applications, providing information on security, and appropriate governance with clear details to help you achieve success with SOA, including the design and creation of services for implementation within your enterprise. By the end of this training you will have a high level overview of the benefits of SOA, how to design and implement SOA in your business today. Very little is discussed regarding APIs or code unless used to display the implications of certain technologies and standards. This is a technical training, which is focused on architects, designers, business analysts, IT managers and executives.

Table of Contents

  1. Welcome back to SOA Part Three 00:02:41
  2. Welcome Back 00:02:41
  3. SOA part One 00:04:03
  4. SOA part Three 00:03:32
  5. Versioning 00:05:56
  6. Versioning Policy 00:05:56
  7. Service Changes 00:06:55
  8. Deployment & Access 00:07:29
  9. Service Based Security 00:05:04
  10. Security Gateway Part 1 00:05:04
  11. Security Gateway Part 2 00:05:40
  12. Security Interception 00:04:48
  13. Exception Handling 00:06:39
  14. Exception Logging 00:04:29
  15. Management and Monitoring 00:05:48
  16. Major Aspects 00:05:48
  17. Business Monitoring 00:06:42
  18. Technical Monitoring Part 1 00:06:01
  19. Technical Monitoring Part 2 00:04:57
  20. SOA Security 00:05:54
  21. Security Strategy 00:05:54
  22. Security Goals 00:04:56
  23. Authentication Part1 00:06:46
  24. Authentication Part 2 00:04:28
  25. Access Control Part 1 00:05:21
  26. Access Control Part 2 00:04:36
  27. Enterprise Access 00:06:18
  28. Confidentiality 00:05:31
  29. Integrity 00:07:40
  30. Web Service Security 00:05:01
  31. SOAP WS-Security 00:05:01
  32. WS- Trust 00:04:37
  33. Federation 00:04:24
  34. WS- Security Policy 00:03:38
  35. SAML 00:04:22
  36. XACML 00:04:44
  37. XML Signature & Encryption 00:04:39
  38. Security Blueprints 00:04:39
  39. Security Separation Part 1 00:04:39
  40. Identify & Authentication 00:02:44
  41. Identify & Propagation PT.1 00:06:57
  42. Idfentify Propagation PT.2 00:04:47
  43. Identify Propagation PT.3 00:05:25
  44. Identify Propagation PT.4 00:05:09
  45. SSL Point to Point 00:04:18
  46. Access Control Blueprints 00:04:05
  47. Data Access 00:04:05
  48. Enforcement PT.1 00:06:19
  49. Enforcement PT.2 00:04:53
  50. Enforcement PT. 3 00:05:07
  51. Enforcement PT.4 00:07:22
  52. Security, Master Plan 00:04:24
  53. Plan, Plan, Plan 00:04:24
  54. Standards 00:05:28
  55. Governance 00:05:30
  56. Essential Governance 00:05:30
  57. Real World Deployments 00:04:30
  58. View the Big Picture 00:05:04
  59. Service Life Cycle 00:07:05
  60. Design Time 00:05:14
  61. Service Identification 00:03:53
  62. Service Specification 00:05:22
  63. Service Implementation 00:03:25
  64. Deployment 00:04:53
  65. Runtime 00:06:15
  66. Practical Governance 00:04:14
  67. Organisational Structure 00:04:14
  68. Policy Development 00:04:33
  69. Service Repository 00:03:10
  70. Dependencies and Evolution 00:04:38
  71. Runtime Policies PT. 1 00:03:56
  72. Runtime Policies PT. 2 00:05:09
  73. Conclusion 00:01:54
  74. Training Content 00:01:54
  75. Author 00:01:28