<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>&#xFF28;&#xFF49;&#xFF44;&#xFF45;&#xFF3A;&#xFF45;&#xFF52;&#xFF4F;&#xFF2F;&#xFF4E;&#xFF45;</provider_name><provider_url>https://hide01.ir</provider_url><title>&#x62F;&#x648;&#x631;&#x647; Attacking and Securing APIS (2021)</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="yGuiLQls8m"&gt;&lt;a href="https://hide01.ir/attacking-and-securing-apis/"&gt;&#x62F;&#x648;&#x631;&#x647;  Attacking and Securing APIS (2021)&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://hide01.ir/attacking-and-securing-apis/embed/#?secret=yGuiLQls8m" width="600" height="338" title="&#x201C;&#x62F;&#x648;&#x631;&#x647;  Attacking and Securing APIS (2021)&#x201D; &#x2014; &#xFF28;&#xFF49;&#xFF44;&#xFF45;&#xFF3A;&#xFF45;&#xFF52;&#xFF4F;&#xFF2F;&#xFF4E;&#xFF45;" data-secret="yGuiLQls8m" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://hide01.ir/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://hide01.ir/wp-content/uploads/2024/02/OIG2-1.jpeg</thumbnail_url><thumbnail_width>1024</thumbnail_width><thumbnail_height>1024</thumbnail_height><description>This is a hand-on practical concentrated course on securing and attacking web and cloud APIs. APIs are everywhere nowadays: In web apps, embedded systems, enterprise apps, cloud environments and even IoT, and it is becoming increasingly necessary to learn how to defend, secure and attack API implementation and infrastructure. This training aims to engage you [&hellip;]</description></oembed>
