Completed
OAuth2 Flow
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
An Overview of API Underprotection
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 API Transformation
- 3 Security Landscape
- 4 The Journey of Complexity
- 5 Examples of Attacks
- 6 Pokemon Go
- 7 Reverse Engineering
- 8 Potential Risks
- 9 Traditional Defenses
- 10 Rate Limiting
- 11 OAuth2 Flow
- 12 User Agent Flow
- 13 API Permissions
- 14 API Keys Software Identity
- 15 Simple API Keys
- 16 Attack Surfaces
- 17 Trust Store
- 18 Pinning
- 19 Whitebox Cryptography
- 20 Remote attestation
- 21 Summary