Home Search Profile

Master API Security: OWASP Top 10 2024 Defense Guide

Focused View

12:03:33

  • 1 - All resources and links for the lesson.txt
  • 1 - Communication plan.mp4
    04:10
  • 2 - OWASP API Security Project OWASP API Security Top 10 2023.html
  • 3 - API12023 Broken Object Level Authorization Part 1.mp4
    15:47
  • 4 - API12023 Broken Object Level Authorization Part 2 Practice.mp4
    11:35
  • 4 - Source code examples from the lesson.txt
  • 5 - API12023 Broken Object Level Authorization Part 3 ZeroTrust UUIDs.mp4
    21:32
  • 6 - API22023 Broken Authentication Part 1 Basics Impact Types of Attacks.mp4
    17:58
  • 7 - API22023 Broken Authentication Part 2 Case Studies OAuth OpenID.mp4
    20:17
  • 8 - API22023 Broken Authentication P3 Practice JWT Tokens Timing Attacks.mp4
    27:49
  • 8 - Source code examples from the lesson.txt
  • 9 - API32023 Broken Object Property Level Authorization Part 1.mp4
    20:50
  • 10 - API32023 Broken Object Property Level Authorization Part 2 Practice.mp4
    16:24
  • 10 - Source code examples from the lesson.txt
  • 11 - API42023 Unrestricted Resource Consumption Part 1.mp4
    27:09
  • 12 - API42023 Unrestricted Resource Consumption Part 2 Practice.mp4
    09:56
  • 12 - Source code examples from the lesson.txt
  • 13 - API52023 Broken Function Level Authorization Part 1.mp4
    19:18
  • 14 - API52023 Broken Function Level Authorization Part 2 Practice.mp4
    08:32
  • 14 - Source code examples from the lesson.txt
  • 15 - API62023 Unrestricted Access to Sensitive Business Flows Part 1.mp4
    20:03
  • 16 - API62023 Unrestricted Access to Sensitive Business Flows Part 2.mp4
    25:11
  • 17 - API62023 Unrestricted Access to Sensitive Business Flows Part 3 Practice.mp4
    09:55
  • 17 - Source code examples from the lesson.txt
  • 18 - API72023 Server Side Request Forgery.html
  • 19 - API82023 Security Misconfiguration.html
  • 20 - API92023 Improper Inventory Management Part 1.mp4
    27:02
  • 21 - Improper Inventory Management Part 2 Practice.mp4
    11:29
  • 21 - Source code examples from the lesson.txt
  • 22 - API102023 Unsafe Consumption of APIs Part 1.mp4
    30:30
  • 23 - API102023 Unsafe Consumption of APIs Part 2 Practice.mp4
    09:28
  • 23 - Source code examples from the lesson.txt
  • 24 - Common Weakness Enumeration CWE official website.txt
  • 24 - OWASP Top 10 Overview.mp4
    18:47
  • 25 - Broken Access Control.mp4
    35:21
  • 25 - Source code examples from the lesson.txt
  • 26 - Cryptography Failures Theory Sensitive Data Data Breach Types of Failures.mp4
    12:58
  • 27 - Cryptography Failures Practical Examples SQL Injections TLSSSL HTTPS.mp4
    19:16
  • 27 - Source code examples from the lesson.txt
  • 28 - Cryptography Failures Examples Password Encryption Hashing Salting.mp4
    17:36
  • 28 - Source code examples from the lesson.txt
  • 29 - Injection Overview Fuzzing CWEs Impact Injection Types Command Injection.mp4
    15:21
  • 30 - Injection Cross Site Scripting Types of XSS SQL JPA NoSQL Injections.mp4
    16:30
  • 31 - Injection XPath Injection Log Injection Input Validation.mp4
    16:02
  • 31 - Source code examples from the lesson.txt
  • 32 - Insecure Design Overivew CWEs Shift Left Security Threat Modeling Manifesto.mp4
    19:42
  • 33 - Insecure Design Secure Design Process Security Controls Metrics Examples.mp4
    22:58
  • 34 - Security Misconfiguration Overview CWEs Types Reallife attacks.mp4
    20:17
  • 35 - All resources and links for the lesson.txt
  • 35 - Security Misconfiguration Hardening Zero Trust Defense in Depth Practice.mp4
    29:02
  • 36 - All resources and links for the lesson.txt
  • 36 - Vulnerable Outdated Components.mp4
    23:04
  • 37 - Identification Authentication Failures.mp4
    33:54
  • 38 - Software Data Integrity Failures.mp4
    17:33
  • 39 - Computer Security Incident Handling Guide.txt
  • 39 - Security Logging Monitoring Failures.mp4
    22:54
  • 40 - ServerSide Request Forgery SSRF.mp4
    24:32
  • 41 - All resources and links for the lesson.txt
  • 41 - Bonus lesson.mp4
    02:51
  • More details


    Course Overview

    Master the OWASP API Security Top 10 with hands-on Java examples, real-world vulnerabilities, and proven mitigation strategies to build hacker-resistant APIs.

    What You'll Learn

    • Identify and mitigate all OWASP API Top 10 vulnerabilities including BOLA and SSRF
    • Implement secure authentication with JWT, OAuth, and Zero Trust principles
    • Conduct comprehensive API security testing and threat modeling

    Who This Is For

    • Developers building or maintaining RESTful APIs
    • Security professionals specializing in application security
    • Tech leads implementing API security architecture

    Key Benefits

    • Practical defense strategies against real API attack vectors
    • Hands-on labs with vulnerable code examples and fixes
    • Compliance-ready security practices for API development

    Curriculum Highlights

    1. Broken Object Level Authorization (BOLA) deep dive
    2. Secure authentication with JWT and OAuth implementation
    3. Server-Side Request Forgery (SSRF) mitigation techniques
    Focused display
    • language english
    • Training sessions 38
    • duration 12:03:33
    • Release Date 2025/04/30