Introduction to the OWASP API Security Top 10
Application Programming Interfaces (APIs) enable access to software functions and data and have become a prime target for attackers. Learn why API security is so vital as you explore the top 10 security threats for APIs as identified by the Open Web Application Security Project (OWASP) in this Introduction to the OWASP API Security Top 10 course.
Course Description
Students will learn about broken object level authorization, broken authentication, excessive data exposure, lack of resources and rate limiting, broken function level authorization, mass assignment, security misconfigurations, injection attacks, improper asset management, and insufficient logging and monitoring.
This course is targeted towards software engineers, but anyone can take the course.
It is recommended that students have some software development experience and/or experience in at least one programming language, but coding skills are not required to complete this course.
By the end of this course, students should be able to:
Prerequisites
By the end of this course, students should be able to:
Understand the OWASP API Security Top 10
Understand how to mitigate the OWASP Top 10
Module 1: Introduction
Module 2: OWASP API Security Top 10
Module 3: Conclusion
User Reviews
Be the first to review “Introduction to the OWASP API Security Top 10”
You must be logged in to post a review.
There are no reviews yet.