Free
Introduction to the OWASP API Security Top 10
Application Programming Interfaces (APIs) enable access to software functions and data and have become a prime target for attackers. Learn why API security is so vital as you explore the top 10 security threats for APIs as identified by the Open Web Application Security Project (OWASP) in this Introduction to the OWASP API Security Top 10 course.
0
H
53
M
Time
beginner
difficulty
2
ceu/cpe
Course Content
Conclusion
Conclusion
Introduction
Introduction
Security Fundamentals
OWASP API Security Top 10
Who is OWASP?
OWASP API Security Top 10
A1: Broken Object Level Authorization
OWASP API Security Top 10
A2: Broken Authentication
OWASP API Security Top 10
A3: Excessive Data Exposure
OWASP API Security Top 10
A4: Lack of Resource and Rate Limiting
OWASP API Security Top 10
A5: Broken Function Level Authorization
OWASP API Security Top 10
A6: Mass Assignment
OWASP API Security Top 10
A7: Security Misconfiguration
OWASP API Security Top 10
Security Misconfiguration Lab Part 1
OWASP API Security Top 10
Security Misconfiguration Lab Part 2
OWASP API Security Top 10
Introduction To OWASP Top Ten: A6 - Security Misconfiguration - Scored
OWASP API Security Top 10
A8: Injection
OWASP API Security Top 10
Improper Assets Management
OWASP API Security Top 10
A10: Insufficient Logging and Monitoring
OWASP API Security Top 10
Insufficient Logging and Monitoring Lab
OWASP API Security Top 10
Course Description
Students will learn about broken object level authorization, broken authentication, excessive data exposure, lack of resources and rate limiting, broken function level authorization, mass assignment, security misconfigurations, injection attacks, improper asset management, and insufficient logging and monitoring.