Learn how to find, exploit and defend against OAuth 2.0 vulnerabilities.
Course•By Rana Khalil
Includes navigation links and user settings