Useful Links
Computer Science
Cybersecurity
Web Application Security
1. Introduction to Web Application Security
2. Core Web Technologies and Protocols
3. Common Vulnerabilities and Attacks
4. Authentication and Session Management
5. Secure Development Lifecycle
6. Web Application Defense and Hardening
7. API Security
8. Security Testing and Assessment
9. Advanced Security Topics
API Security
API Security Fundamentals
API Types and Architectures
REST APIs
SOAP APIs
GraphQL APIs
gRPC APIs
API Attack Surface
Endpoints
Parameters
Headers
Authentication Mechanisms
OWASP API Security Top 10
Broken Object Level Authorization
IDOR in APIs
Resource Access Control
Broken User Authentication
Authentication Bypass
Token Vulnerabilities
Excessive Data Exposure
Over-Fetching Data
Sensitive Data Leakage
Lack of Resources and Rate Limiting
Resource Exhaustion
DoS Prevention
Broken Function Level Authorization
Administrative Function Access
Privilege Escalation
Mass Assignment
Parameter Pollution
Object Property Manipulation
Security Misconfiguration
Default Configurations
Verbose Error Messages
Injection Vulnerabilities
SQL Injection in APIs
NoSQL Injection in APIs
Command Injection
Improper Assets Management
API Versioning
Deprecated Endpoints
Documentation Management
Insufficient Logging and Monitoring
API Activity Logging
Anomaly Detection
Incident Response
API Authentication and Authorization
API Key Management
Key Generation
Key Distribution
Key Rotation
Key Revocation
OAuth 2.0 for APIs
Bearer Tokens
Scope-Based Authorization
Token Introspection
JWT for APIs
Token Structure
Claims Validation
Token Signing
mTLS Authentication
Client Certificate Authentication
Certificate Management
API-Specific Security Controls
Input Validation for APIs
Schema Validation
Parameter Validation
Content-Type Validation
Output Filtering
Response Filtering
Data Minimization
Rate Limiting for APIs
Per-User Rate Limits
Per-Endpoint Rate Limits
Burst Protection
API Versioning Security
Backward Compatibility
Deprecation Strategies
Securing Different API Types
REST API Security
HTTP Method Security
Resource-Based Security
Stateless Authentication
GraphQL Security
Query Complexity Analysis
Query Depth Limiting
Introspection Disabling
Authorization in GraphQL
SOAP API Security
WS-Security Standards
XML Signature
XML Encryption
SOAP Fault Handling
Previous
6. Web Application Defense and Hardening
Go to top
Next
8. Security Testing and Assessment