In this course, Kirby Kohlmorgen shows how to use this document database’s native and third-party integration security features and resources to ensure the security of your MongoDB deployments.
Kirby covers authentication mechanisms and methods, and dives into authorization and encryption, discussing built-in and user-defined roles, how to create and grant privileges to a role, and transport encryption.
He also goes into auditing—including how to configure an audit from the command line—and security checklists and reports. By the end of this course, you’ll have the knowledge needed to deploy a secure MongoDB cluster, configure the role-based authorization model to your needs, set up encryption, do proper auditing, and follow security best practices