We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

Securing APIs with Apigee X

Google Cloud Training

This is a self-paced lab that takes place in the Google Cloud console. In this lab, you modify an API to require OAuth tokens for access. You use the SpikeArrest policy to limit the rate of API calls by application, and you use private variables and data masking to hide sensitive data from users who debug API traffic.

Enroll now

What's inside

Syllabus

Securing APIs with Apigee X

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores securing APIs using a variety of techniques and tools, such as authentication, authorization, rate limiting, and data masking
Taught by Google Cloud Training, who are recognized for their work in cloud computing
Teaches skills that are highly relevant to industry, such as API security and data protection
Provides hands-on labs and interactive materials, which can help learners apply the concepts they learn
Can help learners develop professional skills in API security and data protection
Suitable for learners with some experience in cloud computing and API development

Save this course

Save Securing APIs with Apigee X to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Securing APIs with Apigee X. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Securing APIs with Apigee X will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts protect computer systems and networks from unauthorized access, breaches, and other threats. They develop and implement security policies, and they monitor systems for suspicious activity. This course may be useful to Information Security Analysts who want to learn how to use Apigee X to secure APIs, and to protect sensitive data from unauthorized access.
Security Engineer
Security Engineers design, implement, and maintain security systems and networks. They protect systems from unauthorized access, breaches, and other threats. This course may be useful to Security Engineers who want to learn how to use Apigee X to secure APIs, and to protect networks and data from unauthorized access.
Security Architect
Security Architects design and implement security solutions for organizations. They work with business leaders and IT staff to identify security risks and develop strategies to mitigate them. This course may be useful to Security Architects who want to learn how to use Apigee X to secure APIs, and to protect organizations from unauthorized access and data breaches.
Cloud Security Engineer
Cloud Security Engineers plan, implement, and maintain the security of cloud computing systems and applications. They protect data from unauthorized access, breaches, and other threats. This course may be useful to Cloud Security Engineers who want to learn how to use Apigee X to secure APIs, and to protect sensitive data from users who debug API traffic.
Security Consultant
Security Consultants help organizations to improve their security posture. They assess security risks, develop security plans, and implement security measures. This course may be useful to Security Consultants who want to learn how to use Apigee X to secure APIs, and to help organizations protect their data from unauthorized access and breaches.
Software Developer
Software Developers design, develop, and maintain software applications. They work with businesses to understand their needs and develop software that meets those needs. This course may be useful to Software Developers who want to learn how to use Apigee X to secure APIs, and to protect data from unauthorized access.
Data Scientist
Data Scientists use data to solve business problems and make predictions. They collect, clean, and analyze data, and then develop models that can be used to predict future events. This course may be useful to Data Scientists who want to learn how to use Apigee X to protect the data that they use for their models, and to prevent unauthorized access to their models.
Web Developer
Web Developers design, develop, and maintain websites. They work with businesses to understand their needs and develop websites that meet those needs. This course may be useful to Web Developers who want to learn how to use Apigee X to secure APIs, and to protect data from unauthorized access.
DevOps Engineer
DevOps Engineers work with developers and operations teams to ensure that software is delivered quickly and securely. They automate the software development and deployment process, and they monitor the performance of applications in production. This course may be useful to DevOps Engineers who want to learn how to use Apigee X to secure APIs, and to automate the deployment of security updates.
Network Engineer
Network Engineers design, build, and maintain computer networks. They ensure that networks are reliable, secure, and efficient. This course may be useful to Network Engineers who want to learn how to use Apigee X to secure APIs, and to protect networks from unauthorized access.
Systems Administrator
Systems Administrators install, configure, and maintain computer systems and networks. They ensure that systems are running smoothly and securely. This course may be useful to Systems Administrators who want to learn how to use Apigee X to secure APIs, and to protect systems from unauthorized access.
Technical Support Engineer
Technical Support Engineers provide technical support to customers. They help customers troubleshoot problems and resolve issues. This course may be useful to Technical Support Engineers who want to learn how to use Apigee X to secure APIs, and to help customers protect their data from unauthorized access.
Solutions Architect
Solutions Architects design and implement technology solutions for organizations. They work with business leaders and IT staff to identify business needs and develop solutions that meet those needs. This course may be useful to Solutions Architects who want to learn how to use Apigee X to secure APIs, and to protect customer data from unauthorized access.
Product Manager
Product Managers are responsible for the planning, development, and launch of new products. They work with engineers, designers, and marketers to bring products to market that meet the needs of customers. This course may be useful to Product Managers who want to learn how to use Apigee X to secure APIs, and to protect customer data from unauthorized access.
Backend Developer
Backend Developers design, develop, and maintain the server-side logic for web applications. They ensure that data is stored and processed securely, and that the application can handle a high volume of traffic. This course may be useful to Backend Developers who want to learn how to protect APIs from unauthorized access and data breaches, and to limit the rate of API calls to prevent abuse.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Securing APIs with Apigee X.
Survey of the main API security issues, including authentication, authorization, data validation, and rate limiting. It also discusses how to implement security measures in a variety of API frameworks.
Provides a comprehensive overview of OAuth 2.0 and OpenID Connect, including how to use them to secure APIs. It also discusses common security pitfalls and how to avoid them.
A classic work on RESTful web API design principles and best practices, providing a foundation for understanding API security concepts.
Provides a comprehensive overview of web application security. It covers a wide range of topics, including authentication, authorization, rate limiting, and data protection.
Provides a comprehensive overview of RESTful web services security. It covers a wide range of topics, including authentication, authorization, rate limiting, and data protection.
This document provides a list of the top 10 web application security risks. It valuable resource for understanding the most common web application security vulnerabilities.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Securing APIs with Apigee X.
Data Loss Prevention: Qwik Start - Command Line
Process Documents with Python Using the Document AI API
Data Loss Prevention: Qwik Start - JSON
Streaming HL7 to FHIR Data with Healthcare API
Transcoding HTTP/JSON API calls to gRPC through API...
Build an End-to-End Data Capture Pipeline using Document...
Modernizing Applications with Apigee X
MongoDB Atlas with Natural Language API and Cloud Run
De-identifying DICOM Data with the Healthcare API
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser