Introduction to the OWASP API Security Top 10

Cybrary
Course
Now offers labs

Application Programming Interfaces (APIs) enable access to software functions and data and have become a prime target for attackers. Learn why API security is so vital as you explore the top 10 security threats for APIs as identified by the Open Web Application Security Project (OWASP) in this Introduction to the OWASP API Security Top 10 course.

Time
1 hour 43 minutes
Difficulty
Beginner
CEU/CPE
2
4.6
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Course Description

Students will learn about broken object level authorization, broken authentication, excessive data exposure, lack of resources and rate limiting, broken function level authorization, mass assignment, security misconfigurations, injection attacks, improper asset management, and insufficient logging and monitoring.

Target Audience

This course is targeted towards software engineers, but anyone can take the course.

Prerequisites

It is recommended that students have some software development experience and/or experience in at least one programming language, but coding skills are not required to complete this course.

Course Goals

By the end of this course, students should be able to:

  • Understand the OWASP API Security Top 10
  • Understand how to mitigate the OWASP Top 10
  • Understand why API security is important
Instructed By
Ken Underhill
Ken Underhill
Senior Instructor
Provider
Cybrary
Course Components
On Demand Videos to learn from industry leaders
Virtual Labs to gain hands on experience and apply what you learned
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a Introduction to the OWASP API Security Top 10 Certificate of Completion