Master API Security: OWASP Top 10 2024 Defense Guide
Focused View
12:03:33
1 - All resources and links for the lesson.txt
1 - Communication plan.mp4
04:10
2 - OWASP API Security Project OWASP API Security Top 10 2023.html
3 - API12023 Broken Object Level Authorization Part 1.mp4
15:47
4 - API12023 Broken Object Level Authorization Part 2 Practice.mp4
11:35
4 - Source code examples from the lesson.txt
5 - API12023 Broken Object Level Authorization Part 3 ZeroTrust UUIDs.mp4
21:32
6 - API22023 Broken Authentication Part 1 Basics Impact Types of Attacks.mp4
17:58
7 - API22023 Broken Authentication Part 2 Case Studies OAuth OpenID.mp4
20:17
8 - API22023 Broken Authentication P3 Practice JWT Tokens Timing Attacks.mp4
27:49
8 - Source code examples from the lesson.txt
9 - API32023 Broken Object Property Level Authorization Part 1.mp4
20:50
10 - API32023 Broken Object Property Level Authorization Part 2 Practice.mp4
16:24
10 - Source code examples from the lesson.txt
11 - API42023 Unrestricted Resource Consumption Part 1.mp4
27:09
12 - API42023 Unrestricted Resource Consumption Part 2 Practice.mp4
09:56
12 - Source code examples from the lesson.txt
13 - API52023 Broken Function Level Authorization Part 1.mp4
19:18
14 - API52023 Broken Function Level Authorization Part 2 Practice.mp4
08:32
14 - Source code examples from the lesson.txt
15 - API62023 Unrestricted Access to Sensitive Business Flows Part 1.mp4
20:03
16 - API62023 Unrestricted Access to Sensitive Business Flows Part 2.mp4
25:11
17 - API62023 Unrestricted Access to Sensitive Business Flows Part 3 Practice.mp4
09:55
17 - Source code examples from the lesson.txt
18 - API72023 Server Side Request Forgery.html
19 - API82023 Security Misconfiguration.html
20 - API92023 Improper Inventory Management Part 1.mp4
27:02
21 - Improper Inventory Management Part 2 Practice.mp4
11:29
21 - Source code examples from the lesson.txt
22 - API102023 Unsafe Consumption of APIs Part 1.mp4
30:30
23 - API102023 Unsafe Consumption of APIs Part 2 Practice.mp4
09:28
23 - Source code examples from the lesson.txt
24 - Common Weakness Enumeration CWE official website.txt
24 - OWASP Top 10 Overview.mp4
18:47
25 - Broken Access Control.mp4
35:21
25 - Source code examples from the lesson.txt
26 - Cryptography Failures Theory Sensitive Data Data Breach Types of Failures.mp4
12:58
27 - Cryptography Failures Practical Examples SQL Injections TLSSSL HTTPS.mp4
19:16
27 - Source code examples from the lesson.txt
28 - Cryptography Failures Examples Password Encryption Hashing Salting.mp4
17:36
28 - Source code examples from the lesson.txt
29 - Injection Overview Fuzzing CWEs Impact Injection Types Command Injection.mp4
15:21
30 - Injection Cross Site Scripting Types of XSS SQL JPA NoSQL Injections.mp4
16:30
31 - Injection XPath Injection Log Injection Input Validation.mp4
16:02
31 - Source code examples from the lesson.txt
32 - Insecure Design Overivew CWEs Shift Left Security Threat Modeling Manifesto.mp4
19:42
33 - Insecure Design Secure Design Process Security Controls Metrics Examples.mp4
22:58
34 - Security Misconfiguration Overview CWEs Types Reallife attacks.mp4
20:17
35 - All resources and links for the lesson.txt
35 - Security Misconfiguration Hardening Zero Trust Defense in Depth Practice.mp4
29:02
36 - All resources and links for the lesson.txt
36 - Vulnerable Outdated Components.mp4
23:04
37 - Identification Authentication Failures.mp4
33:54
38 - Software Data Integrity Failures.mp4
17:33
39 - Computer Security Incident Handling Guide.txt
39 - Security Logging Monitoring Failures.mp4
22:54
40 - ServerSide Request Forgery SSRF.mp4
24:32
41 - All resources and links for the lesson.txt
41 - Bonus lesson.mp4
02:51
More details
Course Overview
Master the OWASP API Security Top 10 with hands-on Java examples, real-world vulnerabilities, and proven mitigation strategies to build hacker-resistant APIs.
What You'll Learn
- Identify and mitigate all OWASP API Top 10 vulnerabilities including BOLA and SSRF
- Implement secure authentication with JWT, OAuth, and Zero Trust principles
- Conduct comprehensive API security testing and threat modeling
Who This Is For
- Developers building or maintaining RESTful APIs
- Security professionals specializing in application security
- Tech leads implementing API security architecture
Key Benefits
- Practical defense strategies against real API attack vectors
- Hands-on labs with vulnerable code examples and fixes
- Compliance-ready security practices for API development
Curriculum Highlights
- Broken Object Level Authorization (BOLA) deep dive
- Secure authentication with JWT and OAuth implementation
- Server-Side Request Forgery (SSRF) mitigation techniques
Focused display
- language english
- Training sessions 38
- duration 12:03:33
- Release Date 2025/04/30