Instructional Video3:57
Curated Video

A Detailed Guide to the OWASP Top 10 - API10:2023 Unsafe Consumption of APIs

Higher Ed
In this video, we will delve into the dangers of Unsafe Consumption of APIs, emphasizing the need for secure API usage practices.
Instructional Video6:46
Curated Video

A Detailed Guide to the OWASP Top 10 - API9:2023 Improper Inventory Management

Higher Ed
In this session, we will address the challenges of Improper Inventory Management in API ecosystems and propose solutions for better management.
Instructional Video2:33
Curated Video

A Detailed Guide to the OWASP Top 10 - API8:2023 Security Misconfiguration

Higher Ed
In this video, explore Security Misconfiguration risks in APIs, highlighting common misconfigurations and how to secure API settings.
Instructional Video4:45
Curated Video

A Detailed Guide to the OWASP Top 10 - API7:2023 Server Side Request Forgery

Higher Ed
In this session, tackle the issue of Server Side Request Forgery (SSRF) in APIs, including detection and prevention strategies.
Instructional Video6:14
Curated Video

A Detailed Guide to the OWASP Top 10 - API6:2023 Unrestricted Access to Sensitive Business Flows

Higher Ed
In this video, discuss the risks and consequences of having unrestricted access to sensitive business flows in APIs.
Instructional Video4:05
Curated Video

A Detailed Guide to the OWASP Top 10 - API5:2023 Broken Function Level Authorization

Higher Ed
In this session, we will analyze Broken Function Level Authorization, understanding its impact on API security and methods to prevent it.
Instructional Video11:03
Curated Video

A Detailed Guide to the OWASP Top 10 - API4:2023 Unrestricted Resource Consumption

Higher Ed
In this video, explore how Unrestricted Resource Consumption can affect API performance and security, and how to protect against it.
Instructional Video5:27
Curated Video

A Detailed Guide to the OWASP Top 10 - API3:2023 Broken Object Property Level Authorization

Higher Ed
In this session, we will uncover the dangers of Broken Object Property Level Authorization and learn effective prevention techniques.
Instructional Video6:33
Curated Video

A Detailed Guide to the OWASP Top 10 - API2:2023 Broken Authentication

Higher Ed
In this video, examine the critical security risk of Broken Authentication within APIs and discuss methods for securing authentication mechanisms.
Instructional Video6:49
Curated Video

A Detailed Guide to the OWASP Top 10 - API1:2023 Broken Object Level Authorization (BOLA)

Higher Ed
In this session, we will delve into the Broken Object Level Authorization risk, its implications, and strategies for mitigation.
Instructional Video3:25
Curated Video

A Detailed Guide to the OWASP Top 10 - API Endpoints

Higher Ed
In this video, we will learn about API endpoints, their role in API architecture, and how they interact with web applications.
Instructional Video8:43
Curated Video

A Detailed Guide to the OWASP Top 10 - Introduction to APIs

Higher Ed
In this session, we will explore the fundamentals of APIs, their importance in modern web applications, and the basics of how they work.
Instructional Video1:14
Curated Video

A Detailed Guide to the OWASP Top 10 - Section Intro

Higher Ed
In this video, we introduce the focus on OWASP's Top 10 API Security Risks for 2023, setting the stage for deep dives into each risk.
Instructional Video2:56
Curated Video

A Detailed Guide to the OWASP Top 10 - #10 Server-Side Request Forgery Prevention

Higher Ed
This video explains the prevention of Server-Side Request Forgery.
Instructional Video8:14
Curated Video

A Detailed Guide to the OWASP Top 10 - #10 Server-Side Request Forgery

Higher Ed
This video explains A10: 2021 - Server-Side Request Forgery (SSRF).
Instructional Video3:09
Curated Video

A Detailed Guide to the OWASP Top 10 - #9 Security Logging and Monitoring Failures Prevention

Higher Ed
This video explains the steps to prevent security logging and monitoring failures.
Instructional Video8:16
Curated Video

A Detailed Guide to the OWASP Top 10 - #9 Security Logging and Monitoring Failures

Higher Ed
This video explains OWASP 09 - security logging and monitoring failures.
Instructional Video2:02
Curated Video

A Detailed Guide to the OWASP Top 10 - Software and Data Integrity Failures Prevention

Higher Ed
This video explains how we can prevent software and data integrity failures.
Instructional Video2:28
Curated Video

A Detailed Guide to the OWASP Top 10 - #8 Software and Data Integrity Failures

Higher Ed
This video explains A08: 2021 - software and data integrity failures.
Instructional Video2:48
Curated Video

A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures Prevention

Higher Ed
This video explains how to prevent identification and authentication failures.
Instructional Video10:04
Curated Video

A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures

Higher Ed
This video explains OWASP 07 - identification and authentication failures.
Instructional Video2:20
Curated Video

A Detailed Guide to the OWASP Top 10 - #6 Vulnerable and Outdated Components Prevention

Higher Ed
This video explains how to prevent vulnerable and outdated components from becoming an issue.
Instructional Video4:56
Curated Video

A Detailed Guide to the OWASP Top 10 - #6 Vulnerable and Outdated Components

Higher Ed
This video explains the A06: 2021 - vulnerable and outdated components.
Instructional Video2:00
Curated Video

A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration Prevention

Higher Ed
This video explains the steps to be taken to prevent the OWASP 05 security misconfiguration.