Understanding the API Attack Vector - How Attackers Exploit Application Communications

Understanding the API Attack Vector - How Attackers Exploit Application Communications

OWASP Foundation via YouTube Direct link

How Do They Get In?! Understanding the API Attack Vector - Michael Isbitski

1 of 1

1 of 1

How Do They Get In?! Understanding the API Attack Vector - Michael Isbitski

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Understanding the API Attack Vector - How Attackers Exploit Application Communications

Automatically move to the next video in the Classroom when playback concludes

  1. 1 How Do They Get In?! Understanding the API Attack Vector - Michael Isbitski

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.