|  

Udemy | Learn OAuth 2 0 - Get started as an API Security Expert [FTU] GloDLS



Size :758.52 MB
Peers : Seeders : 0      Leechers : 0
Added : 5 years ago » by SaM » in Tutorials
Language : English
Last Updated :6 months ago
Info_Hash :CD3C614FA8D9BEE6CAB12E66C0E278C081F1E728

Torrent File Contents

Udemy | Learn OAuth 2 0 - Get started as an API Security Expert [FTU] GloDLS
  0. Websites you may like/1. (FreeTutorials.Us) Download Udemy Paid Courses For Free.url
  -  328 Bytes

  0. Websites you may like/2. (FreeCoursesOnline.Me) Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url
  -  286 Bytes

  0. Websites you may like/3. (NulledPremium.com) Download Cracked Website Themes, Plugins, Scripts And Stock Images.url
  -  163 Bytes

  0. Websites you may like/4. (FTUApps.com) Download Cracked Developers Applications For Free.url
  -  239 Bytes

  0. Websites you may like/5. (Discuss.FTUForum.com) FTU Discussion Forum.url
  -  294 Bytes

  0. Websites you may like/How you can help Team-FTU.txt
  -  237 Bytes

  10. Use OAuth to access Facebook/1. Intro to OAuth on Facebook.mp4
  -  9.96 MB

  10. Use OAuth to access Facebook/1. Intro to OAuth on Facebook.vtt
  -  8.85 KB

  10. Use OAuth to access Facebook/2. Hands On OAuth Flow on Facebook.mp4
  -  41.67 MB

  10. Use OAuth to access Facebook/2. Hands On OAuth Flow on Facebook.vtt
  -  6.98 KB

  10. Use OAuth to access Facebook/3. OAuth Worksheet for Facebook.html
  -  2.12 KB

  11. Use OAuth to access LinkedIn/1. Intro to OAuth on LinkedIn.mp4
  -  10.19 MB

  11. Use OAuth to access LinkedIn/1. Intro to OAuth on LinkedIn.vtt
  -  10.11 KB

  11. Use OAuth to access LinkedIn/2. Hands On Client Registration on LinkedIn.mp4
  -  20.59 MB

  11. Use OAuth to access LinkedIn/2. Hands On Client Registration on LinkedIn.vtt
  -  6.26 KB

  11. Use OAuth to access LinkedIn/3. Hands On OAuth Flow on LinkedIn.mp4
  -  34.12 MB

  11. Use OAuth to access LinkedIn/3. Hands On OAuth Flow on LinkedIn.vtt
  -  9.08 KB

  11. Use OAuth to access LinkedIn/4. OAuth Worksheet for LinkedIn.html
  -  2.04 KB

  12. Use OAuth to access GMail and other Google Products/1. Intro to OAuth on Google.mp4
  -  10.71 MB

  12. Use OAuth to access GMail and other Google Products/1. Intro to OAuth on Google.vtt
  -  10.75 KB

  12. Use OAuth to access GMail and other Google Products/2. Hands On Client Registration on Google.mp4
  -  20.32 MB

  12. Use OAuth to access GMail and other Google Products/2. Hands On Client Registration on Google.vtt
  -  8.08 KB

  12. Use OAuth to access GMail and other Google Products/3. Hands On OAuth Flow on Google.mp4
  -  30.35 MB

  12. Use OAuth to access GMail and other Google Products/3. Hands On OAuth Flow on Google.vtt
  -  10.59 KB

  12. Use OAuth to access GMail and other Google Products/4. OAuth Worksheet for Google.html
  -  2.41 KB

  12. Use OAuth to access GMail and other Google Products/5. Hands On The Google OAuth Playground.mp4
  -  15.96 MB

  12. Use OAuth to access GMail and other Google Products/5. Hands On The Google OAuth Playground.vtt
  -  4.72 KB

  13. Use OAuth to access Paypal/1. Intro to OAuth on Paypal.mp4
  -  6.89 MB

  13. Use OAuth to access Paypal/1. Intro to OAuth on Paypal.vtt
  -  5.33 KB

  13. Use OAuth to access Paypal/2. Hands On Client Registration and OAuth Flow on Paypal.mp4
  -  33.94 MB

  13. Use OAuth to access Paypal/2. Hands On Client Registration and OAuth Flow on Paypal.vtt
  -  10.35 KB

  13. Use OAuth to access Paypal/3. OAuth Worksheet for Paypal.html
  -  2.78 KB

  14. FInal Mission/1. Your Final Mission.mp4
  -  7.97 MB

  14. FInal Mission/1. Your Final Mission.vtt
  -  8 Bytes

  15. Conclusion/1. Thank you!.html
  -  737 Bytes

  15. Conclusion/2. Get a Better Job.html
  -  452 Bytes

  15. Conclusion/3. Book OAuth 2.0 Getting Started in API Security.html
  -  3.01 KB

  15. Conclusion/4. Book OpenID Connect – End-user Identity for Apps and APIs.html
  -  2.6 KB

  15. Conclusion/5.1 Preview_OAuth2_Book.pdf.pdf
  -  735.12 KB

  15. Conclusion/5.2 Preview_API_Architecture_Book.pdf.pdf
  -  604.34 KB

  15. Conclusion/5. Other Learning Resources.html
  -  16.67 KB

  15. Conclusion/6.1 RFC 6749 - OAuth 2.pdf.pdf
  -  234.34 KB

  15. Conclusion/6. Official IETF Specification Document for OAuth 2, RFC 6749.html
  -  139 Bytes

  16. FAQ OAuth on Mobile/1. OAuth for Android and Mobile.html
  -  5.32 KB

  16. FAQ OAuth on Mobile/2. Redirect URL on Ionic.html
  -  3.54 KB

  1. Introduction/1. Welcome.html
  -  258 Bytes

  1. Introduction/2. Introduction Preview of the Course.mp4
  -  12.49 MB

  1. Introduction/2. Introduction Preview of the Course.vtt
  -  789 Bytes

  1. Introduction/3. Introduction What is covered in this course.mp4
  -  25.14 MB

  1. Introduction/3. Introduction What is covered in this course.vtt
  -  2.34 KB

  1. Introduction/4. Introduction Practice Part.mp4
  -  7.36 MB

  1. Introduction/4. Introduction Practice Part.vtt
  -  6.1 KB

  2. OAuth Big Picture/1. Example OAuth for Third Party Access.mp4
  -  2.45 MB

  2. OAuth Big Picture/1. Example OAuth for Third Party Access.vtt
  -  3.02 KB

  2. OAuth Big Picture/2. Example The Password Antipattern.mp4
  -  3.13 MB

  2. OAuth Big Picture/2. Example The Password Antipattern.vtt
  -  3.22 KB

  2. OAuth Big Picture/3. Example The Solution provided by OAuth 2.0.mp4
  -  4.04 MB

  2. OAuth Big Picture/3. Example The Solution provided by OAuth 2.0.vtt
  -  4.14 KB

  2. OAuth Big Picture/4. The Password Anti-Pattern.mp4
  -  77.46 MB

  2. OAuth Big Picture/4. The Password Anti-Pattern.vtt
  -  4.61 KB

  2. OAuth Big Picture/5. OAuth 2.0 Solution.mp4
  -  102.1 MB

  2. OAuth Big Picture/5. OAuth 2.0 Solution.vtt
  -  5.55 KB

  2. OAuth Big Picture/6. OAuth Basics.html
  -  116 Bytes

  2. OAuth Big Picture/7. References to more Information on OAuth 2.0.html
  -  393 Bytes

  3. OAuth Components/1. Section Overview OAuth Terminology.mp4
  -  14.29 MB

  3. OAuth Components/1. Section Overview OAuth Terminology.vtt
  -  919 Bytes

  3. OAuth Components/2. Overview of OAuth Actors.mp4
  -  145.01 MB

  3. OAuth Components/2. Overview of OAuth Actors.vtt
  -  7.79 KB

  3. OAuth Components/3. OAuth Actors in Detail.mp4
  -  9.99 MB

  3. OAuth Components/3. OAuth Actors in Detail.vtt
  -  9.12 KB

  3. OAuth Components/4. OAuth Endpoints.mp4
  -  10.36 MB

  3. OAuth Components/4. OAuth Endpoints.vtt
  -  7.27 KB

  3. OAuth Components/5. The Subway Ticket and the Token.mp4
  -  22.1 MB

  3. OAuth Components/5. The Subway Ticket and the Token.vtt
  -  1014 Bytes

  3. OAuth Components/6. Overview of OAuth Tokens and Credentials.mp4
  -  7.57 MB

  3. OAuth Components/6. Overview of OAuth Tokens and Credentials.vtt
  -  7.37 KB

  3. OAuth Components/7. OAuth Components.html
  -  116 Bytes

  4. OAuth Flows Interactions between the OAuth Components/1. Example Interaction of OAuth Components in an OAuth Flow.mp4
  -  6.11 MB

  4. OAuth Flows Interactions between the OAuth Components/1. Example Interaction of OAuth Components in an OAuth Flow.vtt
  -  6.28 KB

  4. OAuth Flows Interactions between the OAuth Components/2. Overview of OAuth Flows.mp4
  -  5.31 MB

  4. OAuth Flows Interactions between the OAuth Components/2. Overview of OAuth Flows.vtt
  -  3.72 KB

  4. OAuth Flows Interactions between the OAuth Components/3. OAuth Flows.html
  -  116 Bytes

  5. Authorization Code Flow/1. Usage Scenario and Features of this Flow.mp4
  -  6.22 MB

  5. Authorization Code Flow/1. Usage Scenario and Features of this Flow.vtt
  -  3.03 KB

  5. Authorization Code Flow/2. Authorization Code Flow Authorization Endpoint.mp4
  -  14.91 MB

  5. Authorization Code Flow/2. Authorization Code Flow Authorization Endpoint.vtt
  -  13.17 KB

  5. Authorization Code Flow/3. Authorization Code Flow Token Endpoint and Resource Access.mp4
  -  10.78 MB

  5. Authorization Code Flow/3. Authorization Code Flow Token Endpoint and Resource Access.vtt
  -  6.98 KB

  6. Authorization Code Flow Refresh Tokens/1. Usage Scenario and Features of the Refresh Flow.mp4
  -  2.64 MB

  6. Authorization Code Flow Refresh Tokens/1. Usage Scenario and Features of the Refresh Flow.vtt
  -  1.39 KB

  6. Authorization Code Flow Refresh Tokens/2. Authorization Code Flow Refreshing Tokens.mp4
  -  13.71 MB

  6. Authorization Code Flow Refresh Tokens/2. Authorization Code Flow Refreshing Tokens.vtt
  -  9.56 KB

  7. Implicit Flow/1. Usage Scenarios and Features of the Implicit Flow.mp4
  -  3.03 MB

  7. Implicit Flow/1. Usage Scenarios and Features of the Implicit Flow.vtt
  -  1.92 KB

  8. Client Credentials Flow/1. Usage Scenarios and Features of the Client Credentials Flow.mp4
  -  3.02 MB

  8. Client Credentials Flow/1. Usage Scenarios and Features of the Client Credentials Flow.vtt
  -  1.9 KB

  9. Resource Owner Password Credentials Flow/1. Usage Scenarios and Features of the Resource Owner Password Credentials Flow.mp4
  -  4.85 MB

  9. Resource Owner Password Credentials Flow/1. Usage Scenarios and Features of the Resource Owner Password Credentials Flow.vtt
  -  3.12 KB



Torrent Description

Description:


Just imagine what could happen to YOUR professional career if you had skills in OAuth | 6000 satisfied students

Created by: Matthias Biehl
Last updated: 4/2019
Language: English
Caption (CC): Included
Torrent Contains: 98 Files, 17 Folders
Course Source: https://www.udemy.com/learn-oauth-2/

What you'll learn

• Use OAuth to access Google, Paypal, LinkedIn and Facebook APIs
• Use OAuth in Mobile Apps (client-side).
• Use OAuth to protect your APIs and Cloud Solutions
• Apply OAuth Best Practices.
• Choose the correct OAuth Flow flow for your use-case.
• Know the OAuth Terminology: Actors, Endpoints, Tokens.
• Use OAuth in Cloud Solutions (client-side).

Course content
all 50 lectures 03:55:09

Requirements

• You should be familiar with basic web service and API development
• If you would like to use OAuth in a Mobile App, you should know how to develop for the respective platform. Mobile App Development is not covered in this course.

Description

Recent Updates
2019-06-26 Answered 5 questions of my students in the Q&A
2019-06-14 More than 6000 satisfied students
2019-05-30 Answered questions of my students in the Q&A
2019-04-24 More than 5800 satisfied students
2019-04-23 Check out my new Book "Making Money with Alexa Skills" on Amazon!
2019-04-20 Answered questions of my students in the Q&A
2019-02-15 Check out my new Book "OpenID Connect" on Amazon!
2019-02-15 More than 5500 satisfied students from 106 different countries
2019-02-15 Answered questions of my students in the Q&A
2019-01-15 Answered questions of my students in the Q&A
2019-01-15 More than 5300 satisfied students from 106 different countries
2018-11-19 Answered 4 questions of my students in the Q&A
2018-11-08 Answered 7 questions of my students in the Q&A
2018-11-08 More than 4800 satisfied students
2018-08-24 FAQ: OAuth on Mobile> Android, iOS, and Ionic
2018-08-21 More than 4500 satisfied students
2018-08-20 Answered two new questions of my students in the Q&A

This course is for you...

...if you want to improve your market value as a Software Engineer and Security Expert. Imagine what could happen to your professional career if you could add API Security and OAuth skills to your CV!

 API Security experts and engineers who understand OAuth are in HIGH DEMAND, as companies expand their digital business. Plenty of opportunities are waiting for anyone who has the right skills.

Do you want to write best-selling iPhone and Android apps?

The most popular mobile apps integrate with popular social APIs of Google, LinkedIn, Facebook, Paypal and many more. If this is a well known fact, why do app developers not just do it?

Many app developers are afraid of complicated OAuth integrations. Security is in fact the biggest hurdle for most mobile app developers.

With the knowledge gained in this course you can use the secret of best app developers out there and finally integrate your app with social APIs.

 Do you want to start out on your own, as an entrepreneur, consultant or freelancer?

 Knowing API Security and OAuth allows you to realize the big vision  of your company in the field of mobile apps, cloud apps and web APIs, such as Google, Paypal and LinkedIn.

 Do you want to build exciting solutions with the next generation technology?

 Whether you are a web developer, mobile developer or API developer, an architect or embedded developer for the Internet of Things, today you need to know OAuth to build state of the art solutions.

 What does this course offer?

This course offers an introduction to API Security with OAuth 2.0. In 3 hours you will gain an overview of the capabilities of OAuth. You will learn the core concepts of OAuth. You will get to know all 4 OAuth flows that are used in cloud solutions and mobile apps.

If you have tried to read the official OAuth specification, you may get the impression that OAuth is complex. This course explains OAuth in simple terms. The four OAuth flows are visualized graphically using sequence diagrams. The diagrams are then animated so you get to know the interactions step by step and see the big picture of the various OAuth interactions. This high-level overview is complemented with rich set of example requests and responses and an explanation of the technical details.

Who should take this course?

You believe OAuth is complicated? OAuth may seem complex with flows and redirects going back and forth. This course will give you clarity by introducing the seemingly complicated material by many illustrations. These illustrations clearly show all the involved interaction parties and the messages they exchange.

You want to learn the OAuth concepts efficiently? This course uses many animated diagrams and sequence diagrams. A good diagram says more than 1000 words.

You want to use OAuth in your mobile app? If you want to access resources that are protected by OAuth, you need to get a token first, before you can access the resource. For this, you need to understand the OAuth flows and the dependencies between the steps of the flows.

You want to use OAuth to protect your APIs? OAuth is perfectly suited to protect your APIs. You can learn which OAuth endpoints need to be provided and which checks need to be made within the protected APIs.

Who this course is for:

• This course is for beginners in API Security and OAuth.
• This course is not for you, if you already know the four basic OAuth flows and how they are used.