A10 and A9: API and Component Attacks
OWASP
| Intermediate
- 12 Videos | 49m 11s
- Includes Assessment
- Earns a Badge
OWASP Top 10 list items 10 and 9 are exploits of APIs and components of web applications.
WHAT YOU WILL LEARN
-
define what an underprotected API isdescribe how underprotected APIs can be exploited and what kind of access is needed to exploit itdescribe how easy it is to detect underprotected APIs and how common they arelist the technical and business impacts of underprotected APIsprovide examples of underprotected API attacksspecify what a vulnerable component is
-
describe how vulnerable components can be exploited and what kind of access is needed to exploit themdescribe how easy it is to detect vulnerable components and how common they arelist the technical and business impacts of vulnerable componentsprovide examples of vulnerable component attackspurchase merchandise at an unauthorized discountdescribe what A10 and A9 are and how they affect web application security
IN THIS COURSE
-
1.A10 - Underprotected APIs7m 13sUP NEXT
-
2.A10 - Underprotected API Exploits3m 38s
-
3.A10 - Underprotected API Detection8m 17s
-
4.A10 - Unprotected API Impacts3m 48s
-
5.A10 - Unprotected API Examples3m 29s
-
6.A9 - Using Components with Known Vulnerabilities3m 21s
-
7.A9 - Vulnerable Component Exploits2m 12s
-
8.A9 - Vulnerable Component Detection4m 7s
-
9.A9 - Vulnerable Component Impacts4m 7s
-
10.A9 - Vulnerable Component Attacks4m 44s
-
11.A9 - Shopping Cart Component Flaw2m 16s
-
12.Exercise: A10 and A9 Security Risks2m
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.