A10 and A9: API and Component Attacks
OWASP
| Intermediate
- 12 videos | 49m 11s
- Includes Assessment
- Earns a Badge
OWASP Top 10 list items 10 and 9 are exploits of APIs and components of web applications.
WHAT YOU WILL LEARN
-
Define what an underprotected api isDescribe how underprotected apis can be exploited and what kind of access is needed to exploit itDescribe how easy it is to detect underprotected apis and how common they areList the technical and business impacts of underprotected apisProvide examples of underprotected api attacksSpecify what a vulnerable component is
-
Describe how vulnerable components can be exploited and what kind of access is needed to exploit themDescribe how easy it is to detect vulnerable components and how common they areList the technical and business impacts of vulnerable componentsProvide examples of vulnerable component attacksPurchase merchandise at an unauthorized discountDescribe what a10 and a9 are and how they affect web application security
IN THIS COURSE
-
7m 13sIn this video, you will learn how to define what an API is that is underprotected. FREE ACCESS
-
3m 38sAfter completing this video, you will be able to describe how underprotected APIs can be exploited and what kind of access is needed to exploit them. FREE ACCESS
-
8m 17sUpon completion of this video, you will be able to describe how easy it is to detect underprotected APIs and how common they are. FREE ACCESS
-
3m 48sUpon completion of this video, you will be able to list the technical and business impacts of unprotected APIs. FREE ACCESS
-
3m 29sAfter completing this video, you will be able to provide examples of underprotected API attacks. FREE ACCESS
-
3m 21sAfter completing this video, you will be able to specify what a vulnerable component is. FREE ACCESS
-
2m 12sAfter completing this video, you will be able to describe how vulnerable components can be exploited and what kind of access is needed to exploit them. FREE ACCESS
-
4m 7sUpon completion of this video, you will be able to describe how easy it is to detect vulnerable components and how common they are. FREE ACCESS
-
4m 7sUpon completion of this video, you will be able to list the technical and business impacts of vulnerable components. FREE ACCESS
-
4m 44sAfter completing this video, you will be able to provide examples of vulnerable component attacks. FREE ACCESS
-
2m 16sIn this video, you will learn how to purchase merchandise at a discount without authorization. FREE ACCESS
-
2mUpon completion of this video, you will be able to describe what A10 and A9 are and how they affect web application security. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.