Companies Home Search Profile

OWASP API Security Top 10 2023: Comprehensive Security Guide

Focused View

Andrii Piatakha

12:03:33

0 View
  • 1 - All resources and links for the lesson.txt
  • 1 - Communication plan.mp4
    04:10
  • 2 - OWASP API Security Project OWASP API Security Top 10 2023.html
  • 3 - API12023 Broken Object Level Authorization Part 1.mp4
    15:47
  • 4 - API12023 Broken Object Level Authorization Part 2 Practice.mp4
    11:35
  • 4 - Source code examples from the lesson.txt
  • 5 - API12023 Broken Object Level Authorization Part 3 ZeroTrust UUIDs.mp4
    21:32
  • 6 - API22023 Broken Authentication Part 1 Basics Impact Types of Attacks.mp4
    17:58
  • 7 - API22023 Broken Authentication Part 2 Case Studies OAuth OpenID.mp4
    20:17
  • 8 - API22023 Broken Authentication P3 Practice JWT Tokens Timing Attacks.mp4
    27:49
  • 8 - Source code examples from the lesson.txt
  • 9 - API32023 Broken Object Property Level Authorization Part 1.mp4
    20:50
  • 10 - API32023 Broken Object Property Level Authorization Part 2 Practice.mp4
    16:24
  • 10 - Source code examples from the lesson.txt
  • 11 - API42023 Unrestricted Resource Consumption Part 1.mp4
    27:09
  • 12 - API42023 Unrestricted Resource Consumption Part 2 Practice.mp4
    09:56
  • 12 - Source code examples from the lesson.txt
  • 13 - API52023 Broken Function Level Authorization Part 1.mp4
    19:18
  • 14 - API52023 Broken Function Level Authorization Part 2 Practice.mp4
    08:32
  • 14 - Source code examples from the lesson.txt
  • 15 - API62023 Unrestricted Access to Sensitive Business Flows Part 1.mp4
    20:03
  • 16 - API62023 Unrestricted Access to Sensitive Business Flows Part 2.mp4
    25:11
  • 17 - API62023 Unrestricted Access to Sensitive Business Flows Part 3 Practice.mp4
    09:55
  • 17 - Source code examples from the lesson.txt
  • 18 - API72023 Server Side Request Forgery.html
  • 19 - API82023 Security Misconfiguration.html
  • 20 - API92023 Improper Inventory Management Part 1.mp4
    27:02
  • 21 - Improper Inventory Management Part 2 Practice.mp4
    11:29
  • 21 - Source code examples from the lesson.txt
  • 22 - API102023 Unsafe Consumption of APIs Part 1.mp4
    30:30
  • 23 - API102023 Unsafe Consumption of APIs Part 2 Practice.mp4
    09:28
  • 23 - Source code examples from the lesson.txt
  • 24 - Common Weakness Enumeration CWE official website.txt
  • 24 - OWASP Top 10 Overview.mp4
    18:47
  • 25 - Broken Access Control.mp4
    35:21
  • 25 - Source code examples from the lesson.txt
  • 26 - Cryptography Failures Theory Sensitive Data Data Breach Types of Failures.mp4
    12:58
  • 27 - Cryptography Failures Practical Examples SQL Injections TLSSSL HTTPS.mp4
    19:16
  • 27 - Source code examples from the lesson.txt
  • 28 - Cryptography Failures Examples Password Encryption Hashing Salting.mp4
    17:36
  • 28 - Source code examples from the lesson.txt
  • 29 - Injection Overview Fuzzing CWEs Impact Injection Types Command Injection.mp4
    15:21
  • 30 - Injection Cross Site Scripting Types of XSS SQL JPA NoSQL Injections.mp4
    16:30
  • 31 - Injection XPath Injection Log Injection Input Validation.mp4
    16:02
  • 31 - Source code examples from the lesson.txt
  • 32 - Insecure Design Overivew CWEs Shift Left Security Threat Modeling Manifesto.mp4
    19:42
  • 33 - Insecure Design Secure Design Process Security Controls Metrics Examples.mp4
    22:58
  • 34 - Security Misconfiguration Overview CWEs Types Reallife attacks.mp4
    20:17
  • 35 - All resources and links for the lesson.txt
  • 35 - Security Misconfiguration Hardening Zero Trust Defense in Depth Practice.mp4
    29:02
  • 36 - All resources and links for the lesson.txt
  • 36 - Vulnerable Outdated Components.mp4
    23:04
  • 37 - Identification Authentication Failures.mp4
    33:54
  • 38 - Software Data Integrity Failures.mp4
    17:33
  • 39 - Computer Security Incident Handling Guide.txt
  • 39 - Security Logging Monitoring Failures.mp4
    22:54
  • 40 - ServerSide Request Forgery SSRF.mp4
    24:32
  • 41 - All resources and links for the lesson.txt
  • 41 - Bonus lesson.mp4
    02:51
  • Description


    Explore key API security concepts through real examples during the development of web applications, with Java examples

    What You'll Learn?


    • Understand the OWASP API Top 10 vulnerabilities and their impact on security
    • Learn best practices for securing APIs against common threats
    • Identify key tools and techniques for API security assessment
    • Gain hands-on experience with real-world API security scenarios
    • Explore mitigation strategies for each OWASP vulnerability
    • Develop a robust API security strategy for your applications
    • Understand the importance of authentication and authorization in APIs
    • Learn how to perform effective security testing on APIs
    • Learn how to secure sensitive data in API responses
    • Explore the risks of improper CORS configurations in APIs
    • Understand the implications of using third-party APIs securely
    • Gain skills in implementing OAuth and JWT for API security
    • Discover how to handle API versioning securely
    • Learn about the security aspects of API design and architecture
    • Understand the role of security audits and reviews in API development
    • Get practical tips for threat modeling specific to APIs
    • Explore strategies for incident response in API security breaches

    Who is this for?


  • Developers looking to enhance their API security skills
  • Security professionals seeking to understand the latest API vulnerabilities
  • Software engineers interested in building secure applications
  • Students and beginners eager to learn about API security best practices
  • Tech leads and architects wanting to implement robust security measures in their projects
  • What You Need to Know?


  • Basic understanding of web development concepts
  • Familiarity with RESTful APIs and HTTP protocols
  • Knowledge of security principles is a plus but not mandatory
  • No specific tools are required; just a computer with internet access
  • A willingness to learn and explore API security topics
  • More details


    Description

    APIs are the digital highways that connect modern applications, enabling seamless communication between systems, services, and devices. But with great power comes great responsibility—APIs have become one of the most common attack vectors for malicious actors. If you’re developing, deploying, or managing APIs, understanding how to secure them is no longer optional—it’s essential.

    Welcome to the "OWASP API Top 10 2023" course, your step-by-step guide to mastering API security. This course is designed to take you from the basics to advanced protection strategies, all while focusing on the latest OWASP API Top 10 vulnerabilities that pose real threats to your applications.

    You’ll explore key security concepts not just in theory, but through practical, real-world examples. From the very start, you’ll get your hands dirty by diving into the development of web applications that mirror the security challenges professionals face every day. With these real-world examples, you’ll learn how to identify, mitigate, and prevent the most critical vulnerabilities that hackers exploit, such as:

    • Broken Object-Level Authorization

    • Mass Assignment

    • Security Misconfiguration

    • Lack of Rate Limiting
      And many more!

    This course will guide you through:

    • Understanding the OWASP API Top 10 2023 vulnerabilities: What are they? Why do they matter? How can they cripple your application security if left unchecked?

    • Real-world scenarios and practical examples: See how attackers exploit these vulnerabilities and how you can prevent it.

    • Building secure APIs from the ground up: Learn how to develop APIs with security embedded into each stage of the development lifecycle.

    • Mitigation strategies: You’ll not only learn how to detect vulnerabilities but also implement robust security measures to protect your API and the sensitive data it handles.

    • Security best practices: Gain insights into proper authentication, authorization, input validation, rate limiting, and more.

    Whether you're a developer looking to build more secure APIs, a security professional wanting to expand your skill set, or an IT leader responsible for protecting your organization's data, this course is perfect for you. The content is designed to be beginner-friendly, but it also offers deep dives into complex security topics that even seasoned developers and security experts will find valuable.

    By the end of the course, you’ll not only be familiar with the OWASP API Top 10 list but also be equipped to confidently build, test, and secure APIs against the latest threats. You’ll walk away with practical skills and knowledge that can be applied immediately to your projects, helping you build secure, resilient APIs that can stand up to even the most sophisticated attacks.

    Why enroll in this course?

    • Hands-on learning: You won’t just watch; you’ll actively work through real security issues.

    • Up-to-date with OWASP API Top 10 2023: Learn the latest threats and defenses.

    • Expert guidance: Get insights from instructors who specialize in API security.

    • Actionable insights: Gain techniques you can use right away in your job or project.

    • Certificate of completion: Add a valuable credential to your resume and boost your career.

    Don’t wait until your APIs are under attack—take control of your API security now. Enroll today and take the first step towards becoming an expert in API security!

    Who this course is for:

    • Developers looking to enhance their API security skills
    • Security professionals seeking to understand the latest API vulnerabilities
    • Software engineers interested in building secure applications
    • Students and beginners eager to learn about API security best practices
    • Tech leads and architects wanting to implement robust security measures in their projects

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Andrii Piatakha
    Andrii Piatakha
    Instructor's Courses
    Founder and CEO in IT-Bulls. IT-Bulls is a consultancy company that promotes engineering excellence standards, holds audits of software projects, and provides private consultancy. Creator of Learn-IT Online University and mobile application that help to get certified in different domains. Tutor with 5+ years of experience. Key Java Tutor in outsourcing companies. Andrii helps to teach Java software engineers from zero till their first job assignment. You can find courses in different areas. But one of his most popular courses "Java from Zero to First Job". The Java course is used to train people with zero programming knowledge to prepare them for real work in different companies. When you are taking Andrii's courses you can be sure that you will learn the right things in the right way in the shortest possible amount of time.All Andrii's courses are proven by time and success stories of the students.Not all tutors were professional programmers in past. Huge engineering experience allowed Andrii to run his own IT company. During the teaching, Andrii focuses students' attention only on the most important things. Feel free to check out Andrii's LinkedIn profile and especially confirmation of the skills. Already more than 1000+ professional engineers, managers, and software architects all over the World confirmed Andrii's skills in Java EE technologies stack.Andrii spent a lot of time tutoring offline to understand students and key issues they face with during their education process. Detailed homeworks and practical experience - that's what help students to get knowledge. IT-Bulls creates applications with students which allow people to pass internship and get more practical experience.The best students managed to get their first job in IT-Bulls and now become leading engineers in the company!So be prepared to become the best friend of IT-Bulls company.Learn more about Andrii's career and skills in LinkedIn profile and follow Andrii on Instagram!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 38
    • duration 12:03:33
    • Release Date 2025/02/23