Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Getting started with OAuth 2.0
#1
[Image: 4c441517edfffa993cdf66f46245fe04.jpg]
Getting started with OAuth 2.0
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 13 lectures (1h 33m) | Size: 956.6 MB

Covering OAuth 2.0 Workflows, Endpoints, Scopes, Tokens: JWTs and others. No prior programming knowledge needed!

What you'll learn:
Deep understanding of the fundamentals of OAuth 2.0
How is OAuth actually working
OAuth grant types
Deep dive into tokens ,their types and lifetime
What is JWT and its structure
Why Social and Internet Applications give us the option to signup using other applications
Use OAuth to protect your APIs
OAuth Endpoints
OAuth Scopes
Hand-on practice examples to access public APIs using OAuth 2.0

Requirements
No prerequisites needed for this course

Description
OAuth 2.0 has become the web-industry standard protocol for providing secure access to web APIs, allowing applications to access users' data without compromising security and actually passing their password around. Companies around the world add OAuth to their APIs to enable secure access from their own mobile apps and third-party IoT devices and even access to banking APIs. So if you think about the big names in the technology industry, you can pretty much bet they have OAuth implemented.

With that being said, it is pretty obvious that this skill will improve by a mile your software developer abilities and will make you much more valuable in the work field.

If you're building an API, you'll learn in this tutorial the differences and tradeoffs between different access token formats, including JWT, how to choose an appropriate access token lifetime, and how to design scopes to protect various parts of your APIs.

By the end of this course, you'll understand:

The problems OAuth was created to solve

The actual types of workflows regarding OAuth detailed in steps

The basics of OAuth 2.0 including what it is, how it is used, and what it is used for.

OAuth 2.0 Endpoints that you can call

OAuth 2.0 Terminology and key components

Deep dive into tokens and their types

JWT and its structure and also how they work

So, if al of this sounds interesting, I look forward to seeing you guys in the lectures! Smile

Who this course is for
This course is for beginners in API Security and OAuth 2.0

[Image: qlAVWz9m_o.jpg]

[To see links please register or login]

[To see links please register or login]

[To see links please register or login]

[Image: signature.png]
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Download Now   Download Now
Download Now   Download Now