YoVDO

Are You Safe from OWASP #11? - Creating a Successful API Security Program

Offered By: OWASP Foundation via YouTube

Tags

API Security Courses Penetration Testing Courses Incident Response Courses OAuth Courses Inventory Management Courses Data Protection Courses Risk Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of API security beyond the OWASP Top 10 in this engaging 22-minute conference talk. Delve into the essentials of creating a robust API security program at scale, covering topics such as API inventory, data protection, detection and response strategies, active testing, and the overall security journey. Learn why focusing solely on Top 10 lists is insufficient and discover practical approaches to building a comprehensive API security posture. Gain insights into pen testing, ASVS, OAuth, and various API security risks while understanding the importance of a holistic approach to API protection.

Syllabus

Intro
Setting the scene
What you missed
The Top 10
Top 10 Lists
Pen Testing
ASVS
Ola SAM
Oauth Cheat Sheets
API Security Risks
API Web Top 10
API Security Posture
API Inventory
API Data
Detect and Respond
Active Testing
Security Journey


Taught by

OWASP Foundation

Related Courses

Cryptography II
Stanford University via Coursera
Microsoft Enterprise Mobility Suite
Microsoft via edX
Social Media - What No One has Told You about Privacy
openHPI
Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX
Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX