YoVDO

Are You Safe from OWASP #11? - Creating a Successful API Security Program

Offered By: OWASP Foundation via YouTube

Tags

API Security Courses Penetration Testing Courses Incident Response Courses OAuth Courses Inventory Management Courses Data Protection Courses Risk Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of API security beyond the OWASP Top 10 in this engaging 22-minute conference talk. Delve into the essentials of creating a robust API security program at scale, covering topics such as API inventory, data protection, detection and response strategies, active testing, and the overall security journey. Learn why focusing solely on Top 10 lists is insufficient and discover practical approaches to building a comprehensive API security posture. Gain insights into pen testing, ASVS, OAuth, and various API security risks while understanding the importance of a holistic approach to API protection.

Syllabus

Intro
Setting the scene
What you missed
The Top 10
Top 10 Lists
Pen Testing
ASVS
Ola SAM
Oauth Cheat Sheets
API Security Risks
API Web Top 10
API Security Posture
API Inventory
API Data
Detect and Respond
Active Testing
Security Journey


Taught by

OWASP Foundation

Related Courses

Information Security Management in a Nutshell
SAP Learning
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Enterprise Security Fundamentals
Microsoft via edX
Planning a Security Incident Response
Microsoft via edX
Introduction to Cybersecurity
Udacity