YoVDO

Are You Safe from OWASP #11? - Creating a Successful API Security Program

Offered By: OWASP Foundation via YouTube

Tags

API Security Courses Penetration Testing Courses Incident Response Courses OAuth Courses Inventory Management Courses Data Protection Courses Risk Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical aspects of API security beyond the OWASP Top 10 in this engaging 22-minute conference talk. Delve into the essentials of creating a robust API security program at scale, covering topics such as API inventory, data protection, detection and response strategies, active testing, and the overall security journey. Learn why focusing solely on Top 10 lists is insufficient and discover practical approaches to building a comprehensive API security posture. Gain insights into pen testing, ASVS, OAuth, and various API security risks while understanding the importance of a holistic approach to API protection.

Syllabus

Intro
Setting the scene
What you missed
The Top 10
Top 10 Lists
Pen Testing
ASVS
Ola SAM
Oauth Cheat Sheets
API Security Risks
API Web Top 10
API Security Posture
API Inventory
API Data
Detect and Respond
Active Testing
Security Journey


Taught by

OWASP Foundation

Related Courses

Operations Management
University of Illinois at Urbana-Champaign via Coursera
Supply Chain Operations
Rutgers University via Coursera
Supply Chain Logistics
Rutgers University via Coursera
Gestione della Produzione e della Logistica
University of Naples Federico II via Federica
Supply Chain Management: A Decision-Making Framework
Université catholique de Louvain via edX