YoVDO

API Security Tokens Flows and the Big Bad Wolf

Offered By: YouTube

Tags

Conference Talks Courses Software Development Courses Cybersecurity Courses Authorization Courses API Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of API security, token flows, and authorization challenges in this 56-minute conference talk from BSides Columbus 2019. Delve into the world of APIs and digital transformations, understanding their significance in modern technology. Examine common pitfalls in API security and learn best practices for securing resource access through proper authorization and authentication methods. Gain insights into OAuth 2.0, fine-grained authorization, and the importance of adhering to OWASP guidelines. Discover strategies to identify potential security threats and implement robust security measures to protect your APIs from the "big bad wolf" of cyber threats.

Syllabus

Intro
APIs and Digital Transformations
API - The Magic 3 letters!
What Were They Thinking
What Should I Be Thinkinga
Accessing Resources Securely - Authorization
The Authorization Dilemma!
Spot the Wolf!
OAuth2.0: The Scoop
Accessing Resources Securely - Authentication
Authentication: Though Shal Know
Fine Grain Authorization
Live Your OWASP Promise
Line Up Your Players & Get Your Act Together


Related Courses

Authentication & Authorization: OAuth
Udacity
Rails with Active Record and Action Pack
Johns Hopkins University via Coursera
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Managing Identity
Microsoft via edX