The Pragmatic Programmer

Appian, Pega, Java, DevSecOps, Quality Engineering

Top Five Security Threats

Introduction to0 OWASP – https://owasp.org/

Introduction to JWT – JSON Web Tokens are an open, industry standard RFC 7519 method for representing claims securely between two parties. JWT.IO allows you to decode, verify and generate JWT.

APIs are a crucial business driver for delivering data to your applications. In this course, learn about various options for securing your RESTful API that can help you keep your application data—and your users—safe. Instructor Emmanuel Henri begins the course with an overview of top security threats and an introduction to the Open Web Application Security Project (OWASP), an important resource on security. He then steps through how to set up and secure a Node and Express API, including how to add handlers for registration and login, finalize secured endpoints, and test your finalized API. To wrap up, he shares a few alternatives for securing APIs.

  • Open Web Application Security Project (OWASP)
  • Reasons for using a JSON Web Token (JWT)
  • Adding bcrypt password hashing
  • Adding handlers for registration and login
  • Finalizing secured endpoints
  • Testing APIs with Postman