Certified API Security Professional CASP
Hands-on API Security Training

The API security training prepares you for the  Certified API Security Professional (CASP) course, a vendor-neutral certification program designed to assess an IT professional’s API security expertise.

This API security course imparts professionals with deep knowledge of API security, adopting modern security practices and automation to secure APIs with appropriate techniques, catching security issues before they become critical, and alerting relevant engineers in real-time.

Upon completion of this API security course, you will be able to:

  • Identify, exploit, and protect against a wide variety of API security vulnerabilities.
  • Gain a practical understanding of API Security and the tools for automation.
  • Understand and implement the modern ways of scaling API Security Testing.
  • Gain abilities to audit APIs for security measures and provide solutions.
  • Understand, assess, and secure APIs written in different architecture styles.
  • Learn new ways to secure APIs through automation, and DevSecOps practices.

 

CASP

The course was really interesting, and I learned a lot of new things. The labs are structured in a very understandable way, it was great fun to learn in this environment. I can highly recommend these courses.

I just did my second course with these guys and once again it didn’t disappoint. I like how the catalogue is recently now expanding into other topics in the security realm and I look forward to taking them.

  • Self-paced Learning Mode
  • Browser-based Lab Access
  • 24/7 Instructor Support via Mattermost

API Security Training Prerequisites

  1. Course participants should have a basic understanding of Linux Commands and OWASP Top 10. 
  2. Basic knowledge of application development is preferred but is not necessary.

Module 1: Introduction to API Security

  1. Introduction to Application Programming Interface
    1. What is an API?
    2. Need for an API
    3. Why Should You Secure Your APIs?
    4. APIs vs. Web Applications
  2. Understanding API Architecture
    1. Overview of the HTTP protocol
      1. Anatomy of a HTTP Request
      2. Anatomy of a HTTP Response
      3. HTTP Response Codes and Its Significance
      4. Stateless and Stateful Requests
    2. Overview of API architecture
      1. API Protocols
      2. API Data formats
      3. Different Types of APIs
    3. Simple Architecture
      1. How Are APIs Typically Deployed?
    4. Complex Architecture
  3. Strategies To Secure APIs
    1. Threat Modeling of APIs
    2. Traditional VAPT vs API VAPT
  4. API Defenses
    1. Input Validation
    2. Identification
    3. Authentication
    4. Authorization
    5. Data Encryption
    6. Transport Security
    7. Error Handling and Logging
    8. Supply Chain Security
  5. Hands-on Exercises:
    1. Understanding an API Language (Endpoints, Verbs, and State)
    2. Understanding cURL Command
    3. Performing CRUD Operations Using API

Module 2: API Security Tools of the trade

  1. The Moving Parts in an API
    1. API Gateway
    2. Load Balancer/Reverse Proxy
    3. Message Queues
  2. Critical Toolchain for API Development
    1. Source Code Management
    2. CI/CD Tools
    3. Artifact Management
    4. Cloud Platform
    5. Infrastructure as Code
    6. Monitoring and Logging Tools
    7. Collaboration Tools
  3. Containerization
  4. Ability To Talk to an API
    1. cURL (curl)
    2. Postman
    3. OpenAPI (Swagger)
    4. Python
    5. An MITM Proxy
  5. Hands-on Exercises: 
    1. Setup the Burp Suite for API Security Testing
    2. Understand APIs Using OpenAPI Specifications
    3. Performing Reconnaissance on an API
    4. Enumerate User Accounts From an API
    5. Hunt for Vulnerable APIs With Subdomain Enumerations

    Module 3: Authentication Attacks and Defenses

    1. Overview of API Authentication
    2. Types of Authentication
      1. No Authentication (Public APIs)
      2. HTTP Basic Authentication
      3. API Token Authentication
      4. OIDC Authentication
      5. JSON Web Tokens (JWTs)
      6. SAML Tokens
      7. Mutual TLS
    3. Authentication Attacks
      1. Brute Force
      2. Weak Password Storage
      3. Password Reset Workflows
      4. Account Lockouts
      5. Insecure OpenID Connect Configuration
      6. Insecure JWTs Validation
    4. Authentication Defenses
      1. Secure Authentication Workflows
      2. Strong Password and Key Validation
      3. Multi-Factor Authentication
      4. Securely Storing the Tokens
        1. Cookies 
        2. Local Storage and Session Storage
        3. Token Storage and XSS
      5. Rate Limiting
      6. CAPTCHA
    5. Hands-on Exercises:
      1. Talking to an API Using Basic, API Token and OAuth and JWTs
      2. Exploring Broken Authentication Using API Token, Oauth and JWTs
      3. Exploiting Weak Passwords
      4. Bruteforcing the passwords
      5. Exploiting misconfigurations in scope
      6. Forging Tokens 
      7. Abusing JSON Web Token

    Module 4: Authorization Attacks and Defenses

    1. Overview of API Authorization
    2. Types of Authorization
      1. No Authorization
      2. Role-Based Access Control (RBAC)
      3. Discretionary Access Control (DAC)
      4. ‚Äč‚ÄčAttribute-Based Access Control (ABAC)
      5. Relationship-Based Access Control (ReBAC)
    3. Authorization Attacks
      1. Misconfigured Permissions
      2. Broken Object Level Authorization
      3. Broken Function Level Authorization
      4. Horizontal Privilege Escalation
      5. Vertical Privilege Escalation
    4. Authorization Defenses
      1. Defending Object & Function Level Access
      2. Attribute-Based Access Control (ABAC) with Roles, and Relations
      3. Decoupling Authorization Decisions With Policy As Code
    5. Authorizing with OAuth Framework
      1. OAuth Specification
      2. Different Authorization Workflows
      3. Insecure OAuth Configurations
      4. OAuth 2.0 vs OAuth 2.1
      5. Different Types of Tokens
        1. Access Token
        2. Refresh Token
        3. ID Token
    6. Hands-on Exercises:
      1. Bypassing Access Control
      2. Exploiting Broken Object Level Authorization
      3. Exploiting Broken Function Level Authorization
      4. Exploiting Weak/Default Permissions
      5. Finding Another Cell Phone User’s Location

    Module 5: Input validation Threats and Defenses

    1. Introduction to Input Validation
      1. Input Validation
      2. Input Sanitization
    2. Injection Vulnerabilities 
      1. Cross-Site Scripting (XSS)
      2. SQL Injection
      3. ORM Injection
      4. NoSQL Injection
      5. Server Side Request Forgery
      6. Deserialization Issues
      7. Mass Assignment Issues
    3. Fuzzing
      1. Fuzzing 101
      2. Fuzzing vs Brute Forcing
      3. Fuzzing APIs Using Open Source and Commercial Tools
        1. Burp Suite Intruder
        2. OWASP ZAP Fuzzer
        3. Wfuzz
        4. FFUF
    4. Injection Defenses
      1. Implementing Input Validation
      2. Client-Side vs. Server-Side Validation
      3. Whitelisting & Blacklisting
      4. Implementing Input Sanitization
      5. Validating With Regular Expressions
      6. Output Encoding
        1. HTML Encoding
        2. HTML Attribute Encoding
        3. Javascript Encoding
        4. CSS Encoding
      7. Prepared Statements
      8. Content Security Policy
      9. Trusted Types
    5. Hands-on Exercises:
      1. Input Validation Using Industry Best Practices
      2. Finding a Way To Get Free Coupons Without Knowing the Coupon Code
      3. Using Vulnerability Assessment Approaches Effectively
      4. Fuzzing APIs Using FFUF
      5. Exploiting Mass Assignment Vulnerabilities

    Module 6: Other API Security Threats

    1. Introduction to OWASP API Top 10
        1. Broken Object Level Authorization
        2. Broken Authentication
        3. Excessive Data Exposure
        4. Lack of Resources and Rate Limiting
        5. Broken Function Level Authorization
        6. Mass Assignment
        7. Security Misconfigurations
        8. Injection
        9. Improper Asset Management
        10. Insufficient Logging and Monitoring
        11. Broken Object Property Level Authorization
        12. Unrestricted Resource Consumption
        13. Unrestricted Access to Sensitive Business Flows
        14. Server Side Request Forgery
        15. Improper Inventory Management
        16. Unsafe Consumption of APIs
    2. Attacking Caching Layers (Memcache, Proxies, etc.,)
    3. Attacking GraphQL APIs
    4. Attacking SOAP APIs
    5. Abusing Micro-services, and REST APIs
    6. Post Exploitation in the API World
    7. Hands-on Exercises:
          1. Bypassing Rate-Limiting
          2.  Extract Sensitive Data by Abusing Default API Behavior
          3.  Finding and Mitigating an IDOR Vulnerability
          4.  Exploiting the CORS Misconfigurations
          5.  Exploiting Undisclosed API Calls
          6.  Attacking GraphQL APIs

    Module 7: Other API Security Defenses

    1. GraphQL API Security Best Practices
    2. SOAP API Security Best Practices
    3. REST API Security Best Practices
    4. Data Security
      1. Encoding and Decoding
      2. Escaping
      3. Hashing
      4. Encryption and Decryption
    5. Securing Data at Rest Using Encryption
      1. Storing Credentials for Service-to-Service Communication
      2. Password Storage and Its Considerations
      3. Picking a Secure Algorithm
    6. Securing Data in Transit Using TLS
    7. Rate Limiting Best Practices
    8. Security Headers
      1. X-XSS-Protection
      2. HTTP Strict Transport Security (HSTS)
      3. Cache-Control
      4. X-Frame-Options
        1. X-Frame-Options vs frame-ancestors
      5. Content Security Policy
        1. Implementing CSP at Scale
        2. Common Misconfigurations While Using CSP
      6. Cross-Origin Resource Sharing (CORS)
        1. Cookie Based Implementations
        2. Token Based Implementations
    9. Hands-on Exercises:
      1. Bypassing CSP Header
      2. Configuring HSTS To Prevent MITM Attacks
      3. Finding the Missing Security Headers and Fixing Them
      4. Implementing Rate Limiting Using API Gateway
      5. Preventing DOM Based Cross Site Scripting with Trusted Types

    Module 8: Implementing API Security Mechanisms

    1. API Security Design Best Practices
    2. Authentication Implementation
    3. Authorization Implementation
      1. Designing API Permissions
      2. Designing OAuth Scopes
    4. Rate-Limiting Implementation and Best Practices at Different Stages
      1. Reverse Proxy
      2. Load Balancer
      3. API Gateways and WAFs
      4. Request Throttling
    5. Securely Store Secrets Using Hashicorp Vault
    6. Data Security Implementation
    7. Using Transport Layer Security (TLS)
    8. Implementing Sufficient Logging & Monitoring
      1. Secure Logging Implementation
      2. Logging Using Syslog Format
      3. Using ELK To Capture the Log Data
    9. Hands-On Exercises:
      1. Implementing a WAF for APIs
      2. How To Configure TLSv1.2 and Beyond Securely To Achieve A+ on SSLlabs Scans
      3. Adding Content Security Policy Header to an API
      4. Second-Order Sensitive Information Leakage

    Module 9: API Security, the DevSecOps Way

    1. OWASP ASVS Framework
      1. Understanding OWASP ASVS
      2. Using ASVS To Secure Applications and APIs
      3. Creating Checklists With OWASP ASVS
    2. Automated Vulnerability Discovery
    3. Finding Insecure Dependencies Using Software Component Analysis
    4. Finding Vulnerabilities in Code Using Static Application Security Testing
    5. Automating API Attacks Using Dynamic Application Security Testing
    6. Addressing API Security Issues at Scale
    7. Hands-on Exercises:
      1. Creating a Simple CI/CD Pipeline
      2. Deploying a Microservice/Docker Container to Production
      3. Exploiting a Microservice Using Docker Misconfiguration
      4. Exploiting a Microservice Using API Vulnerabilities
      5. Finding and Fixing API Security Issues Using SCA, SAST, and DAST in CI/CD Pipelines
      6. Securely Store Secrets Using Hashicorp Vault

    API Security Certification Process

    1. After completing the course, you can schedule the CASP exam on your preferred date.
    2. The process of achieving Practical DevSecOps CASP Certification can be found here.

    API Security Fundamentals

    No email required

    Ready to learn DevSecOps?

    Get in touch, or Register now!