A10 and A9: API and Component Attacks

OWASP    |    Intermediate
  • 12 videos | 49m 11s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 336 users Rating 4.6 of 336 users (336)
OWASP Top 10 list items 10 and 9 are exploits of APIs and components of web applications.

WHAT YOU WILL LEARN

  • Define what an underprotected api is
    Describe how underprotected apis can be exploited and what kind of access is needed to exploit it
    Describe how easy it is to detect underprotected apis and how common they are
    List the technical and business impacts of underprotected apis
    Provide examples of underprotected api attacks
    Specify what a vulnerable component is
  • Describe how vulnerable components can be exploited and what kind of access is needed to exploit them
    Describe how easy it is to detect vulnerable components and how common they are
    List the technical and business impacts of vulnerable components
    Provide examples of vulnerable component attacks
    Purchase merchandise at an unauthorized discount
    Describe what a10 and a9 are and how they affect web application security

IN THIS COURSE

  • 7m 13s
    In this video, you will learn how to define what an API is that is underprotected. FREE ACCESS
  • 3m 38s
    After completing this video, you will be able to describe how underprotected APIs can be exploited and what kind of access is needed to exploit them. FREE ACCESS
  • Locked
    3.  A10 - Underprotected API Detection
    8m 17s
    Upon completion of this video, you will be able to describe how easy it is to detect underprotected APIs and how common they are. FREE ACCESS
  • Locked
    4.  A10 - Unprotected API Impacts
    3m 48s
    Upon completion of this video, you will be able to list the technical and business impacts of unprotected APIs. FREE ACCESS
  • Locked
    5.  A10 - Unprotected API Examples
    3m 29s
    After completing this video, you will be able to provide examples of underprotected API attacks. FREE ACCESS
  • Locked
    6.  A9 - Using Components with Known Vulnerabilities
    3m 21s
    After completing this video, you will be able to specify what a vulnerable component is. FREE ACCESS
  • Locked
    7.  A9 - Vulnerable Component Exploits
    2m 12s
    After completing this video, you will be able to describe how vulnerable components can be exploited and what kind of access is needed to exploit them. FREE ACCESS
  • Locked
    8.  A9 - Vulnerable Component Detection
    4m 7s
    Upon completion of this video, you will be able to describe how easy it is to detect vulnerable components and how common they are. FREE ACCESS
  • Locked
    9.  A9 - Vulnerable Component Impacts
    4m 7s
    Upon completion of this video, you will be able to list the technical and business impacts of vulnerable components. FREE ACCESS
  • Locked
    10.  A9 - Vulnerable Component Attacks
    4m 44s
    After completing this video, you will be able to provide examples of vulnerable component attacks. FREE ACCESS
  • Locked
    11.  A9 - Shopping Cart Component Flaw
    2m 16s
    In this video, you will learn how to purchase merchandise at a discount without authorization. FREE ACCESS
  • Locked
    12.  Exercise: A10 and A9 Security Risks
    2m
    Upon completion of this video, you will be able to describe what A10 and A9 are and how they affect web application security. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 119 users Rating 4.6 of 119 users (119)
Rating 4.2 of 23 users Rating 4.2 of 23 users (23)
Rating 4.6 of 179 users Rating 4.6 of 179 users (179)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 354 users Rating 4.5 of 354 users (354)
Rating 4.6 of 333 users Rating 4.6 of 333 users (333)
Rating 4.6 of 498 users Rating 4.6 of 498 users (498)