but useful stuff:
certified ethical hacker course can give you a perpetrator's pov on how people get hacked.
owasp cheatsheet and latacora blog are useful reference also.
understanding how companies offer these services also helps, e.g. clerk.com, ory.sh, auth0, okta, supertokens, etc.
understanding how authentication coincides with authorization helps too.
but useful stuff:
certified ethical hacker course can give you a perpetrator's pov on how people get hacked.
owasp cheatsheet and latacora blog are useful reference also.
understanding how companies offer these services also helps, e.g. clerk.com, ory.sh, auth0, okta, supertokens, etc.
understanding how authentication coincides with authorization helps too.