API security Threats and Detection
RCCE students will learn API security assessment, design, and protection including REST API authentication, API gateway configuration, rate limiting, input validation, OAuth token management, and API abuse detection. RCCE students will learn to identify API vulnerabilities including broken object-level authorization, broken authentication, excessive data exposure, lack of resources and rate limiting, broken function-level authorization, and mass assignment. The course covers API threat modeling, implementing API security controls, monitoring API traffic for abuse patterns, securing GraphQL endpoints, and building API security into development workflows. This threat-focused course teaches students to think like adversaries while building robust defenses. Building on core knowledge, RCCE students will learn to analyze attack techniques, build detection logic, and implement defensive strategies that proactively identify threats before they cause damage. Students develop a threat-informed mindset that drives better security decisions across all operational activities.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing API security Threats and Detection
- Execute hands-on tasks for advanced cyber defense mastery
- Execute hands-on tasks for speaker notes:
- Explain Executive Overview fundamentals
- Execute hands-on tasks for traditional wafs miss api-layer attacks — covering and secure REST & GraphQL APIs.
- Execute hands-on tasks for business impact drivers — covering Regulatory compliance: PCI-DSS, GDPR, HIPAA mandate API data protection.
- Design a scalable privilege management architecture with policy and enforcement
- Execute hands-on tasks for basic auth
- Execute hands-on tasks for use case
- Execute hands-on tasks for risk level
- Execute hands-on tasks for gateway security functions
- Execute hands-on tasks for enterprise gateway platforms — covering TLS termination and certificate pinning.
- Execute hands-on tasks for rate limiting & resource protection
| Module 01 | Advanced Cyber Defense Mastery |
| Module 02 | Speaker Notes: |
| Module 03 | Executive Overview |
| Module 04 | Traditional WAFs miss API-layer attacks |
| Module 05 | Business Impact Drivers |
| Module 06 | API Security Architecture |
| Module 07 | Basic Auth |
| Module 08 | Use Case |
| Module 09 | Risk Level |
| Module 10 | Gateway Security Functions |
| Module 11 | Enterprise Gateway Platforms |
| Module 12 | Rate Limiting & Resource Protection |
| Module 13 | Fixed Window |
| Module 14 | Sliding Window |
All hands-on labs run on Rocheston Rose X OS. Students practice api security threats and detection by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Execute hands-on tasks for advanced cyber defense mastery
- Lab 2: Execute hands-on tasks for speaker notes:
- Lab 3: Explain Executive Overview fundamentals
- Lab 4: Execute hands-on tasks for traditional wafs miss api-layer attacks
- Lab 5: Execute hands-on tasks for business impact drivers
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for API security Threats and Detection, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI