YoVDO

API Security Tokens Flows and the Big Bad Wolf

Offered By: YouTube

Tags

Conference Talks Courses Software Development Courses Cybersecurity Courses Authorization Courses API Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of API security, token flows, and authorization challenges in this 56-minute conference talk from BSides Columbus 2019. Delve into the world of APIs and digital transformations, understanding their significance in modern technology. Examine common pitfalls in API security and learn best practices for securing resource access through proper authorization and authentication methods. Gain insights into OAuth 2.0, fine-grained authorization, and the importance of adhering to OWASP guidelines. Discover strategies to identify potential security threats and implement robust security measures to protect your APIs from the "big bad wolf" of cyber threats.

Syllabus

Intro
APIs and Digital Transformations
API - The Magic 3 letters!
What Were They Thinking
What Should I Be Thinkinga
Accessing Resources Securely - Authorization
The Authorization Dilemma!
Spot the Wolf!
OAuth2.0: The Scoop
Accessing Resources Securely - Authentication
Authentication: Though Shal Know
Fine Grain Authorization
Live Your OWASP Promise
Line Up Your Players & Get Your Act Together


Related Courses

Software as a Service
University of California, Berkeley via Coursera
Software Testing
University of Utah via Udacity
The Hardware/Software Interface
University of Washington via Coursera
Software Debugging
Saarland University via Udacity
Introduction to Systematic Program Design - Part 1
The University of British Columbia via Coursera