
This course will teach you how to test web APIs for authorization and access control related security flaws. You will learn how to map API functionality, identify authentication and authorization flaws, and exploit common API vulnerabilities.
Course Length: 4 Hours
Includes a Certificate of Completion
					Next scheduled date:
								
												
						 
					
							
			Description
This course will teach you how to test web APIs for authorization and access control related security flaws. You will learn how to map API functionality, identify authentication and authorization flaws, and exploit common API vulnerabilities.
You will also gain hands-on experience with tools and techniques for testing API authorization mechanisms and access control models. By the end of this course, you will be able to:
- Perform API reconnaissance and endpoint analysis
- Scan APIs for security misconfigurations and excessive data exposure
- Attack API authentication schemes
- Test API authorization mechanisms for vulnerabilities like insecure direct object references and privilege escalation
- Test APIs for rate limiting and business logic flaws
- Combine tools and techniques to exploit API weaknesses
System Requirements
- 
								Student Requirements- Students will need a computer capable of running the local SamuraiWTF VM lab environment.
 
FAQ
How to attack REST APIs
How to prevent API security flaws
Explore and attack OAuth and JWTs
Understand that strong data validation is key to API security
Anyone with an interest in REST API security will benefit from this course. The course is aimed at teaching students how to think about REST API security from an attacker mindset, which is useful for defenders and attackers alike.
About the Instructor
 
							Jennifer Shannon
"Known Bad Actor"Bio
Jennifer is a Senior Security Consultant with Secure Ideas with a background in malware analysis, penetration testing, and teaching. She graduated with honors from Florida State College at Jacksonville’s networking program. An avid computer geek for most of her life, she began her journey in cybersecurity as a SOC Analyst where she showed an aptitude for both penetration testing and malware analysis. She was quickly promoted into a role that capitalized on her abilities.
Related products
- 
	BB KingLiveOD16 HrsModern Webapp Pentesting II: Webapp Internals with BB KingView Course This product has multiple variants. The options may be chosen on the product page
- 
	Beau BullockLive4 HrsWorkshop: Introduction to Cloud Security with Beau BullockView Course
- 
	Kevin JohnsonLive4 HrsProfessionally Evil Application Security: Unveiling Server-Side Discovery and Exploitation with Kevin JohnsonView Course
- 
	Kevin JohnsonLive4 HrsProfessionally Evil Application Security: Mastering Application Reconnaissance and Mapping with Kevin JohnsonView Course
