A10 and A9: API and Component Attacks
OWASP
| Intermediate
- 12 videos | 49m 11s
- Includes Assessment
- Earns a Badge
OWASP Top 10 list items 10 and 9 are exploits of APIs and components of web applications.
WHAT YOU WILL LEARN
-
define what an underprotected API isdescribe how underprotected APIs can be exploited and what kind of access is needed to exploit itdescribe how easy it is to detect underprotected APIs and how common they arelist the technical and business impacts of underprotected APIsprovide examples of underprotected API attacksspecify what a vulnerable component is
-
describe how vulnerable components can be exploited and what kind of access is needed to exploit themdescribe how easy it is to detect vulnerable components and how common they arelist the technical and business impacts of vulnerable componentsprovide examples of vulnerable component attackspurchase merchandise at an unauthorized discountdescribe what A10 and A9 are and how they affect web application security
IN THIS COURSE
-
7m 13s
-
3m 38s
-
8m 17s
-
3m 48s
-
3m 29s
-
3m 21s
-
2m 12s
-
4m 7s
-
4m 7s
-
4m 44s
-
2m 16s
-
2m
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.