Free

Introduction to the OWASP API Security Top 10

Application Programming Interfaces (APIs) enable access to software functions and data and have become a prime target for attackers. Learn why API security is so vital as you explore the top 10 security threats for APIs as identified by the Open Web Application Security Project (OWASP) in this Introduction to the OWASP API Security Top 10 course.
0
53
M
Time
beginner
difficulty
2
ceu/cpe

Course Content

Improper Assets Management

2m

OWASP API Security Top 10
A8: Injection

2m

OWASP API Security Top 10
A7: Security Misconfiguration

2m

OWASP API Security Top 10
A6: Mass Assignment

2m

OWASP API Security Top 10
A3: Excessive Data Exposure

2m

OWASP API Security Top 10
A2: Broken Authentication

3m

OWASP API Security Top 10
Who is OWASP?

3m

OWASP API Security Top 10
Security Fundamentals

7m

OWASP API Security Top 10
Introduction

4m

Introduction
Conclusion

1m

Conclusion
Course Description

Students will learn about broken object level authorization, broken authentication, excessive data exposure, lack of resources and rate limiting, broken function level authorization, mass assignment, security misconfigurations, injection attacks, improper asset management, and insufficient logging and monitoring.

Target Audience

This course is targeted towards software engineers, but anyone can take the course.

Prerequisites

It is recommended that students have some software development experience and/or experience in at least one programming language, but coding skills are not required to complete this course.

Course Goals

By the end of this course, students should be able to:

  • Understand the OWASP API Security Top 10
  • Understand how to mitigate the OWASP Top 10
  • * Understand why API security is important

    This course is part of a Career Path:
    No items found.

    Instructed by

    Instructor
    Ken Underhill

    I'm a cybersecurity professional who has worked primarily in healthcare and as an adjunct professor of digital forensics. I have been instructing online for several years, primarily in business and health-related areas. I hold both the CEH (Certified Ethical Hacker)and CHFI (Computer Hacking Forensic Investigator) certifications from EC-Council and am a content reviewer/writer for both exams (no, I can’t give you the answer key lol). I began helping other professionals pass the CHFI exam after struggling in my first exam attempt. To date, I have helped tens of thousands of people around the world pass the CEH and CHFI exams.

    Provider
    Cybrary Logo
    Certification Body
    Certificate of Completion

    Complete this entire course to earn a Introduction to the OWASP API Security Top 10 Certificate of Completion