Hack Your API First
Offered By: Pluralsight
Course Description
Overview
Recent years have seen a massive explosion in the growth of rich client apps that talk over the web using APIs across HTTP, but unfortunately, all too often they contain serious security vulnerabilities that are actually very easy to locate.
Web based APIs have grown enormously popular in recent years. This is in response to a couple of key changes in the industry: firstly, the enormous growth of mobile apps which frequently talk to back ends over the web. Secondly, the rapidly emerging 'Internet of Things' which promises to bring connectivity to common devices we use in our everyday lives. In the rush to push these products to market, developers are often taking shortcuts on security and leaving online services vulnerable to attack. The risks are not as obvious as they may be in traditional browser based web apps, but they're extremely prevalent and attackers know how to easily identify them. This course teaches you how to go on the offense and hack your own APIs before online attackers do.
Web based APIs have grown enormously popular in recent years. This is in response to a couple of key changes in the industry: firstly, the enormous growth of mobile apps which frequently talk to back ends over the web. Secondly, the rapidly emerging 'Internet of Things' which promises to bring connectivity to common devices we use in our everyday lives. In the rush to push these products to market, developers are often taking shortcuts on security and leaving online services vulnerable to attack. The risks are not as obvious as they may be in traditional browser based web apps, but they're extremely prevalent and attackers know how to easily identify them. This course teaches you how to go on the offense and hack your own APIs before online attackers do.
Syllabus
- Introduction 30mins
- Discovering Device Communication With APIs 37mins
- Leaky APIs and Hidden APIs 41mins
- API Manipulation and Parameter Tampering 32mins
- API Authentication and Authorization Vulnerabilities 50mins
- Working With SSL Encrypted API Traffic 54mins
Taught by
Troy Hunt
Related Courses
Cybersecurity: Developing a Program for Your BusinessUniversity System of Georgia via Coursera Types of Cyber Security
Great Learning via YouTube The Internet of Insecure Things - 10 Most Wanted List
YouTube We Are the Cavalry - Why It Has to Be Us and Why Now
LASCON via YouTube IoT Cornerstones of Security
OWASP Foundation via YouTube