Companies Home Search Profile

API Security in Action video edition

Focused View

20:11:06

73 View
  • 001 - Part 1. Foundations.mp4
    01:29
  • 002 - Chapter 1 What is API security.mp4
    11:14
  • 003 - Chapter 1 What is an API.mp4
    07:03
  • 004 - Chapter 1 API security in context.mp4
    09:09
  • 005 - Chapter 1 Elements of API security.mp4
    12:26
  • 006 - Chapter 1 Environments and threat models.mp4
    08:12
  • 007 - Chapter 1 Security mechanisms.mp4
    12:48
  • 008 - Chapter 1 Audit logging.mp4
    09:32
  • 009 - Chapter 2 Secure API development.mp4
    06:16
  • 010 - Chapter 2 Implementation overview.mp4
    06:53
  • 011 - Chapter 2 Developing the REST API.mp4
    08:55
  • 012 - Chapter 2 Injection attacks.mp4
    09:10
  • 013 - Chapter 2 Preventing injection attacks.mp4
    09:34
  • 014 - Chapter 2 Input validation.mp4
    13:37
  • 015 - Chapter 2 Producing safe output.mp4
    10:21
  • 016 - Chapter 2 Preventing XSS.mp4
    10:05
  • 017 - Chapter 3 Securing the Natter API.mp4
    09:40
  • 018 - Chapter 3 Rate-limiting with Guava.mp4
    06:00
  • 019 - Chapter 3 Authentication to prevent spoofing.mp4
    07:45
  • 020 - Chapter 3 Creating the password database.mp4
    06:37
  • 021 - Chapter 3 Authenticating users.mp4
    05:30
  • 022 - Chapter 3 Using encryption to keep data private.mp4
    11:34
  • 023 - Chapter 3 Audit logging for accountability.mp4
    08:35
  • 024 - Chapter 3 Access control.mp4
    12:27
  • 025 - Chapter 3 Adding new members to a Natter space.mp4
    07:45
  • 026 - Part 2. Token-based authentication.mp4
    01:06
  • 027 - Chapter 4 Session cookie authentication.mp4
    08:29
  • 028 - Chapter 4 Serving the HTML from the same origin.mp4
    08:13
  • 029 - Chapter 4 Drawbacks of HTTP authentication.mp4
    05:19
  • 030 - Chapter 4 Token-based authentication.mp4
    10:49
  • 031 - Chapter 4 Session cookies.mp4
    10:21
  • 032 - Chapter 4 Cookie security attributes.mp4
    10:09
  • 033 - Chapter 4 Preventing Cross-Site Request Forgery attacks.mp4
    09:42
  • 034 - Chapter 4 Hash-based double-submit cookies.mp4
    06:49
  • 035 - Chapter 4 Double-submit cookies for the Natter API.mp4
    11:07
  • 036 - Chapter 4 Building the Natter login UI.mp4
    07:07
  • 037 - Chapter 4 Implementing logout.mp4
    06:18
  • 038 - Chapter 5 Modern token-based authentication.mp4
    08:57
  • 039 - Chapter 5 Adding CORS headers to the Natter API.mp4
    09:02
  • 040 - Chapter 5 Tokens without cookies.mp4
    13:24
  • 041 - Chapter 5 The Bearer authentication scheme.mp4
    06:27
  • 042 - Chapter 5 Storing tokens in Web Storage.mp4
    06:04
  • 043 - Chapter 5 Updating the CORS filter.mp4
    08:28
  • 044 - Chapter 5 Hardening database token storage.mp4
    12:48
  • 045 - Chapter 5 Protecting sensitive attributes.mp4
    10:44
  • 046 - Chapter 6 Self-contained tokens and JWTs.mp4
    05:50
  • 047 - Chapter 6 JSON Web Tokens.mp4
    09:24
  • 048 - Chapter 6 The JOSE header.mp4
    07:09
  • 049 - Chapter 6 Generating standard JWTs.mp4
    06:52
  • 050 - Chapter 6 Encrypting sensitive attributes.mp4
    07:59
  • 051 - Chapter 6 Authenticated encryption with NaCl.mp4
    05:41
  • 052 - Chapter 6 Encrypted JWTs.mp4
    09:21
  • 053 - Chapter 6 Using a JWT library.mp4
    05:53
  • 054 - Chapter 6 Using types for secure API design.mp4
    06:24
  • 055 - Chapter 6 Handling token revocation.mp4
    11:44
  • 056 - Part 3. Authorization.mp4
    01:59
  • 057 - Chapter 7 OAuth2 and OpenID Connect.mp4
    11:47
  • 058 - Chapter 7 The difference between scopes and permissions.mp4
    07:35
  • 059 - Chapter 7 Introducing OAuth2.mp4
    13:37
  • 060 - Chapter 7 The Authorization Code grant.mp4
    13:23
  • 061 - Chapter 7 Hardening code exchange with PKCE.mp4
    07:07
  • 062 - Chapter 7 Validating an access token.mp4
    11:19
  • 063 - Chapter 7 Securing the HTTPS client configuration.mp4
    11:16
  • 064 - Chapter 7 JWT access tokens.mp4
    13:50
  • 065 - Chapter 7 Encrypted JWT access tokens.mp4
    06:06
  • 066 - Chapter 7 Single sign-on.mp4
    09:09
  • 067 - Chapter 7 Hardening OIDC.mp4
    12:06
  • 068 - Chapter 8 Identity-based access control.mp4
    08:39
  • 069 - Chapter 8 LDAP groups.mp4
    05:57
  • 070 - Chapter 8 Role-based access control.mp4
    07:38
  • 071 - Chapter 8 Static roles.mp4
    09:49
  • 072 - Chapter 8 Attribute-based access control.mp4
    06:16
  • 073 - Chapter 8 Implementing ABAC decisions.mp4
    08:49
  • 074 - Chapter 8 Distributed policy enforcement and XACML.mp4
    11:13
  • 075 - Chapter 9 Capability-based security and macaroons.mp4
    09:53
  • 076 - Chapter 9 Capabilities and REST.mp4
    07:20
  • 077 - Chapter 9 Capabilities as URIs.mp4
    10:46
  • 078 - Chapter 9 Using capability URIs in the Natter API.mp4
    09:01
  • 079 - Chapter 9 HATEOAS.mp4
    09:44
  • 080 - Chapter 9 Capability URIs for browser-based clients.mp4
    10:49
  • 081 - Chapter 9 Hardening capability URIs.mp4
    06:11
  • 082 - Chapter 9 Macaroons Tokens with caveats.mp4
    08:22
  • 083 - Chapter 9 A macaroon token store.mp4
    12:02
  • 084 - Chapter 9 Third-party caveats.mp4
    10:48
  • 085 - Part 4. Microservice APIs in Kubernetes.mp4
    01:30
  • 086 - Chapter 10 Microservice APIs in Kubernetes.mp4
    11:03
  • 087 - Chapter 10 Deploying Natter on Kubernetes.mp4
    05:00
  • 088 - Chapter 10 Building H2 database as a Docker container.mp4
    11:32
  • 089 - Chapter 10 Deploying the database to Kubernetes.mp4
    10:50
  • 090 - Chapter 10 Building the Natter API as a Docker container.mp4
    08:05
  • 091 - Chapter 10 The link-preview microservice.mp4
    10:35
  • 092 - Chapter 10 Preventing SSRF attacks.mp4
    12:02
  • 093 - Chapter 10 DNS rebinding attacks.mp4
    05:33
  • 094 - Chapter 10 Securing communications with TLS.mp4
    07:09
  • 095 - Chapter 10 Using a service mesh for TLS.mp4
    11:11
  • 096 - Chapter 10 Locking down network connections.mp4
    08:35
  • 097 - Chapter 10 Securing incoming requests.mp4
    11:49
  • 098 - Chapter 11 Securing service-to-service APIs.mp4
    06:39
  • 099 - Chapter 11 The OAuth2 client credentials grant.mp4
    10:07
  • 100 - Chapter 11 The JWT bearer grant for OAuth2.mp4
    11:15
  • 101 - Chapter 11 Generating the JWT.mp4
    07:37
  • 102 - Chapter 11 Mutual TLS authentication.mp4
    11:44
  • 103 - Chapter 11 Verifying client identity.mp4
    07:56
  • 104 - Chapter 11 Using a service mesh.mp4
    10:43
  • 105 - Chapter 11 Certificate-bound access tokens.mp4
    12:57
  • 106 - Chapter 11 Managing service credentials.mp4
    12:14
  • 107 - Chapter 11 Key and secret management services.mp4
    10:55
  • 108 - Chapter 11 Avoiding long-lived secrets on disk.mp4
    05:04
  • 109 - Chapter 11 Key derivation.mp4
    08:51
  • 110 - Chapter 11 Service API calls in response to user requests.mp4
    09:02
  • 111 - Chapter 11 OAuth2 token exchange.mp4
    09:10
  • 112 - Chapter 11.OAuth2 token exchange.mp4
    06:17
  • 113 - Part 5. APIs for the Internet of Things.mp4
    01:31
  • 114 - Chapter 12 Securing IoT communications.mp4
    06:20
  • 115 - Chapter 12 Datagram TLS.mp4
    07:06
  • 116 - Chapter 12 Datagram TLS.mp4
    10:28
  • 117 - Chapter 12 Datagram TLS.mp4
    07:05
  • 118 - Chapter 12 Cipher suites for constrained devices.mp4
    05:46
  • 119 - Chapter 12 Cipher suites for constrained devices.mp4
    06:53
  • 120 - Chapter 12 Cipher suites for constrained devices.mp4
    06:21
  • 121 - Chapter 12 Pre-shared keys.mp4
    08:47
  • 122 - Chapter 12 The PSK client.mp4
    10:07
  • 123 - Chapter 12 End-to-end security.mp4
    08:23
  • 124 - Chapter 12 COSE.mp4
    07:58
  • 125 - Chapter 12 Alternatives to COSE.mp4
    07:08
  • 126 - Chapter 12 Misuse-resistant authenticated encryption.mp4
    06:23
  • 127 - Chapter 12 Misuse-resistant authenticated encryption.mp4
    07:45
  • 128 - Chapter 12 Key distribution and management.mp4
    09:20
  • 129 - Chapter 12 Ratcheting for forward secrecy.mp4
    05:00
  • 130 - Chapter 12 Post-compromise security.mp4
    11:31
  • 131 - Chapter 13 Securing IoT APIs.mp4
    07:22
  • 132 - Chapter 13 Device certificates.mp4
    09:00
  • 133 - Chapter 13 End-to-end authentication.mp4
    09:34
  • 134 - Chapter 13 OSCORE.mp4
    13:52
  • 135 - Chapter 13 Avoiding replay in REST APIs.mp4
    12:17
  • 136 - Chapter 13 OAuth2 for constrained environments.mp4
    06:42
  • 137 - Chapter 13 OAuth2 for constrained environments.mp4
    07:26
  • 138 - Chapter 13 Offline access control.mp4
    05:18
  • 139 - Chapter 13 Offline authorization.mp4
    07:30
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    O'Reilly Media is an American learning company established by Tim O'Reilly that publishes books, produces tech conferences, and provides an online learning platform. Its distinctive brand features a woodcut of an animal on many of its book covers.
    • language english
    • Training sessions 139
    • duration 20:11:06
    • Release Date 2023/11/06