Companies Home Search Profile

OWASP API Security Top 10 latest standards

Focused View

Basics Strong

3:07:18

0 View
  • 1. Introduction.mp4
    03:19
  • 1. Introduction to API Security.mp4
    07:41
  • 1. Why OWSAP 10 and API security.mp4
    02:00
  • 1. Understanding BOLA and the Risk.mp4
    03:59
  • 2. Examples.mp4
    03:45
  • 3. Mitigation Strategies.mp4
    04:26
  • 4. Summary.mp4
    02:03
  • 1. Understanding Broken Authentication and Risk.mp4
    04:27
  • 2. Examples.mp4
    03:31
  • 3. Mitigation Strategies.mp4
    05:14
  • 4. Summary.mp4
    01:28
  • 1. Understanding Broken Object Property Level Authorization and the Risk.mp4
    04:25
  • 2. Examples.mp4
    03:13
  • 3. Mitigation Strategies.mp4
    04:29
  • 4. Summary.mp4
    01:21
  • 1. Understanding Unrestricted Resource Consumption and the Risk.mp4
    04:46
  • 2. Examples.mp4
    03:18
  • 3. Mitigation Strategies.mp4
    06:32
  • 4. Summary.mp4
    01:44
  • 1. Understanding Broken Function Level Authorization and the Risk.mp4
    03:55
  • 2. Examples.mp4
    02:40
  • 3. Mitigation Strategies.mp4
    03:52
  • 4. Summary.mp4
    01:08
  • 1. Understanding Unrestricted Access to Sensitive Business Flows and the Risk.mp4
    02:08
  • 2. Examples.mp4
    02:47
  • 3. Summary.mp4
    01:55
  • 1. Understanding Server Side Request Forgery and the Risk.mp4
    03:58
  • 2. Examples.mp4
    03:31
  • 3. Mitigation Strategies.mp4
    04:21
  • 4. Summary.mp4
    01:01
  • 1. Understanding Security Misconfiguration and the Risk.mp4
    03:37
  • 2. Examples.mp4
    02:38
  • 3. Mitigation Strategies.mp4
    04:13
  • 4. Summary.mp4
    00:55
  • 1. Understanding Improper Inventory Management and the Risk.mp4
    03:56
  • 2. Examples.mp4
    02:48
  • 3. Mitigation Strategies.mp4
    04:07
  • 4. Summary.mp4
    00:48
  • 1. Understanding Unsafe Consumption of APIs and the Risk.mp4
    03:19
  • 2. Examples.mp4
    03:00
  • 3. Mitigation.mp4
    04:28
  • 4. Summary.mp4
    01:01
  • 1. Summary.mp4
    04:26
  • 1. What Are Secure Design Principles.mp4
    06:44
  • 2. Economy of mechanism.mp4
    05:24
  • 3. Fail Safe Defaults.mp4
    03:42
  • 4. Complete Mediation.mp4
    04:21
  • 5. Open Design.mp4
    02:07
  • 6. Least Privilege.mp4
    02:03
  • 7. Separation of Privilege.mp4
    04:35
  • 8. Least Common Mechanism.mp4
    05:32
  • 9. Psychological Acceptability.mp4
    03:02
  • 10. Work Factor.mp4
    02:24
  • 11. Compromise Recording.mp4
    02:28
  • 12. Summary.mp4
    02:43
  • Description


    OWASP API Security Top 10 2023 Latest Standards

    What You'll Learn?


    • Developers: Software and web developers who want to integrate robust security measures into their API development process.
    • Engineering Managers: Managers overseeing development teams, looking to ensure that best security practices are followed
    • System Architects: Professionals responsible for designing secure and scalable system architectures
    • Security Professionals: Individuals focused on maintaining and enhancing the security posture of their organization's digital assets.

    Who is this for?


  • Developers
  • Engineering Managers
  • Architects
  • System Security Professionals
  • What You Need to Know?


  • basics knowledge of APIs and Coing
  • More details


    Description

    OWASP Top 10 for API Security: For Latest 2023 Standards


    API Security is a critical aspect for developers, engineering managers, system architects, and security professionals. It's essential because prevention is better than cure. One security incident can bring an entire organization down with financial losses and reputational damage.


    But what if someone has already thought through everything and created a list for you? Yes, OWASP has published an updated list for API security in 2023, refining the standards established in 2019. OWASP’s focus has always been to help organizations maintain robust security practices.


    In this course, we will delve into the OWASP Top 10 API Security risks for 2023. We will cover each item in detail, including:


    • Understanding the Risks: Gain a comprehensive understanding of each security risk identified by OWASP.

    • Real-World Examples: Explore scenarios that illustrate how these vulnerabilities can be exploited.

    • Mitigation Strategies: Learn practical strategies to mitigate these risks and protect your APIs.


    By completing this course, you will:


    • Enhance Your Security Knowledge: Become confident in your ability to identify and address API security risks.

    • Implement Best Practices: Adhere to security best practices in your projects, ensuring robust API security.

    • Boost Your Career: Equip yourself with the knowledge that is critical for modern software development and security.


    Security today is not just the concern of security professionals but has become a key performance indicator (KPI) for everyone involved in the software development lifecycle. Therefore, we highly recommend that you take this course.


    Let’s get started on securing your APIs and protecting your organization from potential security threats. Join us now and become a part of the solution in maintaining secure, reliable applications.

    Who this course is for:

    • Developers
    • Engineering Managers
    • Architects
    • System Security Professionals

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Basics Strong
    Basics Strong
    Instructor's Courses
    Hi,We are a team of technocrats from IITs who work for solving problems through technology. We work on mission critical projects in AI, Machine Learning, BlockChain as domain and Java, Python, JavaScript and a lot of tools and technologies in technology space.We all as a group love to code and Program.We believe in strong foundation that's why we create courses which helps us students and professionals to build their Basics. Strong foundation and basics of programming concepts can lead to solve any technical problem and to excel in the career. That's why we as a team  thinks everyday how to make the complicated concepts easy to learn. All our courses are practical and with hands-on examples and comprehensive working files. All Our videos are created after a  comprehensive  research and reviews.Happy Learning! and All The Best for a Great Foundation!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 55
    • duration 3:07:18
    • Release Date 2024/09/18