Torrent Info
Title [ CourseLala.com ] API Security in Action video edition
Category
Size 7.40GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
001 - Part 1. Foundations.mp4 7.62MB
002 - Chapter 1 What is API security.mp4 58.44MB
003 - Chapter 1 What is an API.mp4 38.31MB
004 - Chapter 1 API security in context.mp4 46.19MB
005 - Chapter 1 Elements of API security.mp4 64.97MB
006 - Chapter 1 Environments and threat models.mp4 42.67MB
007 - Chapter 1 Security mechanisms.mp4 71.84MB
008 - Chapter 1 Audit logging.mp4 49.85MB
009 - Chapter 2 Secure API development.mp4 39.72MB
010 - Chapter 2 Implementation overview.mp4 46.13MB
011 - Chapter 2 Developing the REST API.mp4 51.11MB
012 - Chapter 2 Injection attacks.mp4 52.14MB
013 - Chapter 2 Preventing injection attacks.mp4 62.15MB
014 - Chapter 2 Input validation.mp4 92.12MB
015 - Chapter 2 Producing safe output.mp4 67.26MB
016 - Chapter 2 Preventing XSS.mp4 65.04MB
017 - Chapter 3 Securing the Natter API.mp4 56.75MB
018 - Chapter 3 Rate-limiting with Guava.mp4 37.25MB
019 - Chapter 3 Authentication to prevent spoofing.mp4 47.35MB
020 - Chapter 3 Creating the password database.mp4 40.11MB
021 - Chapter 3 Authenticating users.mp4 31.23MB
022 - Chapter 3 Using encryption to keep data private.mp4 66.70MB
023 - Chapter 3 Audit logging for accountability.mp4 58.44MB
024 - Chapter 3 Access control.mp4 78.35MB
025 - Chapter 3 Adding new members to a Natter space.mp4 46.69MB
026 - Part 2. Token-based authentication.mp4 5.18MB
027 - Chapter 4 Session cookie authentication.mp4 53.50MB
028 - Chapter 4 Serving the HTML from the same origin.mp4 53.13MB
029 - Chapter 4 Drawbacks of HTTP authentication.mp4 37.17MB
030 - Chapter 4 Token-based authentication.mp4 68.92MB
031 - Chapter 4 Session cookies.mp4 62.12MB
032 - Chapter 4 Cookie security attributes.mp4 70.14MB
033 - Chapter 4 Preventing Cross-Site Request Forgery attacks.mp4 69.18MB
034 - Chapter 4 Hash-based double-submit cookies.mp4 48.76MB
035 - Chapter 4 Double-submit cookies for the Natter API.mp4 82.64MB
036 - Chapter 4 Building the Natter login UI.mp4 40.47MB
037 - Chapter 4 Implementing logout.mp4 39.79MB
038 - Chapter 5 Modern token-based authentication.mp4 45.99MB
039 - Chapter 5 Adding CORS headers to the Natter API.mp4 50.35MB
040 - Chapter 5 Tokens without cookies.mp4 77.18MB
041 - Chapter 5 The Bearer authentication scheme.mp4 30.60MB
042 - Chapter 5 Storing tokens in Web Storage.mp4 30.10MB
043 - Chapter 5 Updating the CORS filter.mp4 44.39MB
044 - Chapter 5 Hardening database token storage.mp4 70.67MB
045 - Chapter 5 Protecting sensitive attributes.mp4 61.55MB
046 - Chapter 6 Self-contained tokens and JWTs.mp4 37.11MB
047 - Chapter 6 JSON Web Tokens.mp4 64.47MB
048 - Chapter 6 The JOSE header.mp4 39.77MB
049 - Chapter 6 Generating standard JWTs.mp4 48.85MB
050 - Chapter 6 Encrypting sensitive attributes.mp4 59.19MB
051 - Chapter 6 Authenticated encryption with NaCl.mp4 34.20MB
052 - Chapter 6 Encrypted JWTs.mp4 56.98MB
053 - Chapter 6 Using a JWT library.mp4 38.65MB
054 - Chapter 6 Using types for secure API design.mp4 45.41MB
055 - Chapter 6 Handling token revocation.mp4 87.36MB
056 - Part 3. Authorization.mp4 9.99MB
057 - Chapter 7 OAuth2 and OpenID Connect.mp4 68.49MB
058 - Chapter 7 The difference between scopes and permissions.mp4 42.31MB
059 - Chapter 7 Introducing OAuth2.mp4 73.82MB
060 - Chapter 7 The Authorization Code grant.mp4 68.88MB
061 - Chapter 7 Hardening code exchange with PKCE.mp4 41.46MB
062 - Chapter 7 Validating an access token.mp4 65.30MB
063 - Chapter 7 Securing the HTTPS client configuration.mp4 62.60MB
064 - Chapter 7 JWT access tokens.mp4 74.41MB
065 - Chapter 7 Encrypted JWT access tokens.mp4 33.40MB
066 - Chapter 7 Single sign-on.mp4 47.52MB
067 - Chapter 7 Hardening OIDC.mp4 66.71MB
068 - Chapter 8 Identity-based access control.mp4 60.87MB
069 - Chapter 8 LDAP groups.mp4 35.83MB
070 - Chapter 8 Role-based access control.mp4 58.97MB
071 - Chapter 8 Static roles.mp4 58.43MB
072 - Chapter 8 Attribute-based access control.mp4 48.20MB
073 - Chapter 8 Implementing ABAC decisions.mp4 52.72MB
074 - Chapter 8 Distributed policy enforcement and XACML.mp4 80.46MB
075 - Chapter 9 Capability-based security and macaroons.mp4 58.97MB
076 - Chapter 9 Capabilities and REST.mp4 43.98MB
077 - Chapter 9 Capabilities as URIs.mp4 59.47MB
078 - Chapter 9 Using capability URIs in the Natter API.mp4 48.52MB
079 - Chapter 9 HATEOAS.mp4 49.87MB
080 - Chapter 9 Capability URIs for browser-based clients.mp4 62.69MB
081 - Chapter 9 Hardening capability URIs.mp4 33.34MB
082 - Chapter 9 Macaroons Tokens with caveats.mp4 41.54MB
083 - Chapter 9 A macaroon token store.mp4 61.08MB
084 - Chapter 9 Third-party caveats.mp4 57.84MB
085 - Part 4. Microservice APIs in Kubernetes.mp4 7.68MB
086 - Chapter 10 Microservice APIs in Kubernetes.mp4 75.46MB
087 - Chapter 10 Deploying Natter on Kubernetes.mp4 28.23MB
088 - Chapter 10 Building H2 database as a Docker container.mp4 78.08MB
089 - Chapter 10 Deploying the database to Kubernetes.mp4 66.60MB
090 - Chapter 10 Building the Natter API as a Docker container.mp4 47.53MB
091 - Chapter 10 The link-preview microservice.mp4 62.50MB
092 - Chapter 10 Preventing SSRF attacks.mp4 81.15MB
093 - Chapter 10 DNS rebinding attacks.mp4 36.42MB
094 - Chapter 10 Securing communications with TLS.mp4 52.71MB
095 - Chapter 10 Using a service mesh for TLS.mp4 67.79MB
096 - Chapter 10 Locking down network connections.mp4 62.05MB
097 - Chapter 10 Securing incoming requests.mp4 70.25MB
098 - Chapter 11 Securing service-to-service APIs.mp4 46.46MB
099 - Chapter 11 The OAuth2 client credentials grant.mp4 64.10MB
100 - Chapter 11 The JWT bearer grant for OAuth2.mp4 73.00MB
101 - Chapter 11 Generating the JWT.mp4 48.65MB
102 - Chapter 11 Mutual TLS authentication.mp4 72.01MB
103 - Chapter 11 Verifying client identity.mp4 49.04MB
104 - Chapter 11 Using a service mesh.mp4 68.50MB
105 - Chapter 11 Certificate-bound access tokens.mp4 88.33MB
106 - Chapter 11 Managing service credentials.mp4 75.77MB
107 - Chapter 11 Key and secret management services.mp4 81.19MB
108 - Chapter 11 Avoiding long-lived secrets on disk.mp4 36.59MB
109 - Chapter 11 Key derivation.mp4 51.99MB
110 - Chapter 11 Service API calls in response to user requests.mp4 64.16MB
111 - Chapter 11 OAuth2 token exchange.mp4 70.75MB
112 - Chapter 11.OAuth2 token exchange.mp4 38.72MB
113 - Part 5. APIs for the Internet of Things.mp4 7.54MB
114 - Chapter 12 Securing IoT communications.mp4 50.00MB
115 - Chapter 12 Datagram TLS.mp4 47.35MB
116 - Chapter 12 Datagram TLS.mp4 70.55MB
117 - Chapter 12 Datagram TLS.mp4 43.95MB
118 - Chapter 12 Cipher suites for constrained devices.mp4 49.24MB
119 - Chapter 12 Cipher suites for constrained devices.mp4 50.72MB
120 - Chapter 12 Cipher suites for constrained devices.mp4 37.66MB
121 - Chapter 12 Pre-shared keys.mp4 56.50MB
122 - Chapter 12 The PSK client.mp4 67.14MB
123 - Chapter 12 End-to-end security.mp4 56.99MB
124 - Chapter 12 COSE.mp4 56.30MB
125 - Chapter 12 Alternatives to COSE.mp4 55.11MB
126 - Chapter 12 Misuse-resistant authenticated encryption.mp4 46.49MB
127 - Chapter 12 Misuse-resistant authenticated encryption.mp4 61.69MB
128 - Chapter 12 Key distribution and management.mp4 69.47MB
129 - Chapter 12 Ratcheting for forward secrecy.mp4 30.82MB
130 - Chapter 12 Post-compromise security.mp4 86.76MB
131 - Chapter 13 Securing IoT APIs.mp4 51.17MB
132 - Chapter 13 Device certificates.mp4 52.60MB
133 - Chapter 13 End-to-end authentication.mp4 78.46MB
134 - Chapter 13 OSCORE.mp4 81.67MB
135 - Chapter 13 Avoiding replay in REST APIs.mp4 76.12MB
136 - Chapter 13 OAuth2 for constrained environments.mp4 45.32MB
137 - Chapter 13 OAuth2 for constrained environments.mp4 51.82MB
138 - Chapter 13 Offline access control.mp4 39.15MB
139 - Chapter 13 Offline authorization.mp4 56.19MB
Bonus Resources.txt 357B
Get Bonus Downloads Here.url 180B
Distribution statistics by country
Total 0
IP List List of IP addresses which were distributed this torrent