API Security on Google Cloud's Apigee API Platform
This course, API Security on Google Cloud's Apigee API Platform, is the second in a series of three courses in the Developing APIs for Google Cloud's Apigee API Platform path. The first course introduces you to API design and the fundamentals of the Apigee platform. This course focuses on API security. The third course focuses on additional API development topics. In this course, you learn how to secure your APIs. You explore the security concerns you will encounter for your APIs. You learn about OAuth, the primary authorization method for REST APIs. You will learn about JSON Web Tokens (JWTs) and federated security. You will also learn about securing against malicious requests, safely sending requests across a public network, and how to secure your data for users of Apigee. This course utilizes hands-on labs that model an API development process that can be used for real-world projects on Google Cloud's Apigee API platform.
What you'll learn
This course, API Security on Google Cloud's Apigee API Platform, is the second in a series of three courses in the Developing APIs for Google Cloud's Apigee API Platform path. The first course introduces you to API design and the fundamentals of the Apigee platform. This course focuses on API security. The third course focuses on additional API development topics. In this course, you learn how to secure your APIs. You explore the security concerns you will encounter for your APIs. You learn about OAuth, the primary authorization method for REST APIs. You will learn about JSON Web Tokens (JWTs) and federated security. You will also learn about securing against malicious requests, safely sending requests across a public network, and how to secure your data for users of Apigee. This course utilizes hands-on labs that model an API development process that can be used for real-world projects on Google Cloud's Apigee API platform.
Table of contents
- Overview 1m
- API Security Concerns 10m
- Identity, Authentication, and Authorization 3m
- OAuth Introduction (1) 6m
- OAuth Introduction (2) 7m
- OAuth Client Credentials Grant 7m
- OAuth Password Grant 6m
- OAuth Authorization Code Grant (1) 2m
- OAuth Authorization Code Grant (2) 9m
- OAuth Authorization Code Grant (3) 7m
- OAuth Wrap-up 4m
- Lab Intro:Using OAuth Client Credentials Grant Type 0m
- Getting started with GCP and Qwiklabs 4m
- Lab 4: Using OAuth 0m
- JWT, JWS, SAML, and OpenID Connect 8m
- Review 0m
- Overview 1m
- Protecting Against Content-Based Attacks (1) 5m
- Protecting Against Content-Based Attacks (2) 6m
- Lab Intro:JSON Threat Protection 0m
- Lab 5: Protecting Against JSON Content Attacks 0m
- Lab Intro:Regex Threat Protection 0m
- Lab 5a: Using Regex Threat Protection 0m
- Transport Security (1) 8m
- Transport Security (2) 5m
- Apigee Management Security (1) 6m
- Apigee Management Security (2) 4m
- Lab Intro:Internal Threat Protection 0m
- Lab 6: Protecting Against Internal Threats 0m
- Lab Intro:Data Masking 0m
- Lab 6a: Masking Sensitive Data 0m
- Review 1m
- Course Review 1m