RCCE Course
Course #58

API security Threats and Detection

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: AppSec
📋 Prerequisites: Web basics
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn API security assessment, design, and protection including REST API authentication, API gateway configuration, rate limiting, input validation, OAuth token management, and API abuse detection. RCCE students will learn to identify API vulnerabilities including broken object-level authorization, broken authentication, excessive data exposure, lack of resources and rate limiting, broken function-level authorization, and mass assignment. The course covers API threat modeling, implementing API security controls, monitoring API traffic for abuse patterns, securing GraphQL endpoints, and building API security into development workflows. This threat-focused course teaches students to think like adversaries while building robust defenses. Building on core knowledge, RCCE students will learn to analyze attack techniques, build detection logic, and implement defensive strategies that proactively identify threats before they cause damage. Students develop a threat-informed mindset that drives better security decisions across all operational activities.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing API security Threats and Detection
🧠 What You Will Learn
  • Execute hands-on tasks for advanced cyber defense mastery
  • Execute hands-on tasks for speaker notes:
  • Explain Executive Overview fundamentals
  • Execute hands-on tasks for traditional wafs miss api-layer attacks — covering and secure REST & GraphQL APIs.
  • Execute hands-on tasks for business impact drivers — covering Regulatory compliance: PCI-DSS, GDPR, HIPAA mandate API data protection.
  • Design a scalable privilege management architecture with policy and enforcement
  • Execute hands-on tasks for basic auth
  • Execute hands-on tasks for use case
  • Execute hands-on tasks for risk level
  • Execute hands-on tasks for gateway security functions
  • Execute hands-on tasks for enterprise gateway platforms — covering TLS termination and certificate pinning.
  • Execute hands-on tasks for rate limiting & resource protection
📚 Course Outline
Module 01Advanced Cyber Defense Mastery
Module 02Speaker Notes:
Module 03Executive Overview
Module 04Traditional WAFs miss API-layer attacks
Module 05Business Impact Drivers
Module 06API Security Architecture
Module 07Basic Auth
Module 08Use Case
Module 09Risk Level
Module 10Gateway Security Functions
Module 11Enterprise Gateway Platforms
Module 12Rate Limiting & Resource Protection
Module 13Fixed Window
Module 14Sliding Window
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice api security threats and detection by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for advanced cyber defense mastery
  • Lab 2: Execute hands-on tasks for speaker notes:
  • Lab 3: Explain Executive Overview fundamentals
  • Lab 4: Execute hands-on tasks for traditional wafs miss api-layer attacks
  • Lab 5: Execute hands-on tasks for business impact drivers
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for API security Threats and Detection, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI