Are You Safe from OWASP #11? - Creating a Successful API Security Program
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the critical aspects of API security beyond the OWASP Top 10 in this engaging 22-minute conference talk. Delve into the essentials of creating a robust API security program at scale, covering topics such as API inventory, data protection, detection and response strategies, active testing, and the overall security journey. Learn why focusing solely on Top 10 lists is insufficient and discover practical approaches to building a comprehensive API security posture. Gain insights into pen testing, ASVS, OAuth, and various API security risks while understanding the importance of a holistic approach to API protection.
Syllabus
Intro
Setting the scene
What you missed
The Top 10
Top 10 Lists
Pen Testing
ASVS
Ola SAM
Oauth Cheat Sheets
API Security Risks
API Web Top 10
API Security Posture
API Inventory
API Data
Detect and Respond
Active Testing
Security Journey
Taught by
OWASP Foundation
Related Courses
Information Security Management in a NutshellSAP Learning Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Enterprise Security Fundamentals
Microsoft via edX Planning a Security Incident Response
Microsoft via edX Introduction to Cybersecurity
Udacity