We may earn an affiliate commission when you visit our partners.
CodeMash

CodeMash 2020 | Securing Your API Endpoints - A Practical Authentication Guide | Seth Petry-Johnson

Read more

CodeMash 2020 | Securing Your API Endpoints - A Practical Authentication Guide | Seth Petry-Johnson

It's never been easier to expose services over HTTP. It's also never been easier to inadvertently expose security holes via those same services. This session is designed for the average developer/architect that wants a brief overview of API security without getting into the weeds of cryptography or complex authentication frameworks. You'll learn from Seth Petry-Johnson about OAuth, API Keys, HMAC, JSON Web Tokens (JWT), and more. Don't worry if those things sound foreign; they'll be explained in a clear, practical way so that you’ll be able to choose the appropriate tool for your specific needs.

Enroll now

What's inside

Syllabus

Securing Your API Endpoints - A Practical Authentication Guide

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Provides a practical overview of API security without delving into complex authentication frameworks or cryptography
Covers essential concepts like OAuth, API Keys, HMAC, and JSON Web Tokens (JWT)
Taught by Seth Petry-Johnson, an experienced professional in API security
Suitable for average developers and architects seeking a foundational understanding of API security
Presents content in a clear and practical manner, making it accessible to learners with varying levels of experience

Save this course

Save Securing Your API Endpoints: CodeMash to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Securing Your API Endpoints: CodeMash. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Securing Your API Endpoints: CodeMash will develop knowledge and skills that may be useful to these careers:
Data Scientist
Data scientists use data to solve problems and make decisions. They work with data to identify patterns, trends, and insights. This course can help you prepare for a career as a data scientist by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
Software Engineer
Software engineers design, develop, and maintain software applications. They work with clients to understand their needs, and then design and develop software that meets those needs. This course can help you prepare for a career as a software engineer by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
Database Administrator
Database administrators are responsible for managing and maintaining databases. They work with databases to ensure that they are reliable, secure, and performant. This course can help you prepare for a career as a database administrator by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
Web Developer
Web developers design and develop websites and web applications. They work with clients to understand their needs, and then design and develop websites and web applications that meet those needs. This course can help you prepare for a career as a web developer by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
Information Security Analyst
Information security analysts are responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They develop and implement security measures to protect against cyberattacks and other threats. This course can help you prepare for a career as an information security analyst by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
Consultant
Consultants provide advice and guidance to organizations on a variety of topics. They work with clients to identify and solve problems. This course can help you prepare for a career as a consultant by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
Cloud Architect
Cloud architects design and develop cloud-based solutions. They work with clients to understand their needs, and then design and develop cloud-based solutions that meet those needs. This course can help you prepare for a career as a cloud architect by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
Risk Manager
Risk managers identify, assess, and mitigate risks to an organization. They work with stakeholders to develop and implement risk management plans. This course can help you prepare for a career as a risk manager by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
Auditor
Auditors evaluate an organization's financial and operational performance. They work with stakeholders to identify and mitigate risks. This course can help you prepare for a career as an auditor by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
DevOps Engineer
DevOps engineers are responsible for bridging the gap between development and operations teams. They work to ensure that software is developed and deployed quickly and efficiently, and that it is reliable and secure. This course can help you prepare for a career as a DevOps engineer by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
IT Manager
IT managers are responsible for planning, implementing, and managing an organization's IT systems and networks. They work with staff to ensure that IT systems are reliable, secure, and performant. This course can help you prepare for a career as an IT manager by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
Security Engineer
Security engineers design, develop, and maintain security systems and networks. They work with clients to understand their needs, and then design and develop security systems that meet those needs. This course can help you prepare for a career as a security engineer by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
Security Analyst
Security analysts are responsible for identifying and assessing risks to an organization's computer systems and networks. They develop and implement security measures to protect against unauthorized access, use, disclosure, disruption, modification, or destruction of information. This course can help you prepare for a career as a security analyst by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
Compliance Officer
Compliance officers ensure that an organization complies with laws and regulations. They work with stakeholders to develop and implement compliance programs. This course can help you prepare for a career as a compliance officer by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.
Systems Engineer
Systems engineers design, develop, and maintain computer systems and networks. They work with clients to understand their needs, and then design and develop systems that meet those needs. This course can help you prepare for a career as a systems engineer by providing you with a solid foundation in the principles and practices of API security. You will learn about different types of API security threats, how to identify and mitigate them, and how to develop and implement effective API security policies and procedures.

Reading list

We haven't picked any books for this reading list yet.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser