Architecture Deep Dive in Spring Security
![](https://i.ytimg.com/vi/toOrt96FfQk/mqdefault.jpg)
53:53
Lessons Learned MIgrating Legacy Enterprise Applications to Microservices
![](https://i.ytimg.com/vi/Z1DfpxQ84as/mqdefault.jpg)
1:26:53
Hands on Spring Security
![](https://i.ytimg.com/vi/gSUeGi4sLlA/mqdefault.jpg)
38:25
Spring Tips: Spring Security 5 OAuth Clients
![](https://i.ytimg.com/vi/1N-xwmoN83w/mqdefault.jpg)
1:11:14
Securing OAuth 2.0 Resources in Spring Security 5.0
![](https://i.ytimg.com/vi/H94Wbd8ARKM/mqdefault.jpg)
58:56
To Spring Security 4.1 and Beyond
![](https://i.ytimg.com/vi/JnYIsvJY7gM/mqdefault.jpg)
1:10:35
Implementing Microservices Security Patterns and Protocols with Spring Security
![](https://i.ytimg.com/vi/EoK5a99Bmjc/mqdefault.jpg)
37:06
Spring Tips: Creating a Spring Security OAuth Auth Service
![](https://i.ytimg.com/vi/oG2rotiGr90/mqdefault.jpg)
1:27:24