<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="36453" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/cydrill-asinjs" lastchanged="2025-10-29T08:57:32+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>API security in Node.js</title><productcode>ASINJS</productcode><vendorcode>CY</vendorcode><vendorname>Cydrill</vendorname><fullproductcode>CY-ASINJS</fullproductcode><version>1.0</version><objective>&lt;ul&gt;
&lt;li&gt;Getting familiar with essential cyber security concepts&lt;/li&gt;&lt;li&gt;Understanding API security issues&lt;/li&gt;&lt;li&gt;Detailed analysis of the OWASP API Security Top Ten elements&lt;/li&gt;&lt;li&gt;Putting API security in the context of JS/TS&lt;/li&gt;&lt;li&gt;Going beyond the low hanging fruits&lt;/li&gt;&lt;li&gt;Managing vulnerabilities in third party components&lt;/li&gt;&lt;li&gt;Input validation approaches and principles&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;General JS/TS development&lt;/p&gt;</essentials><audience>&lt;p&gt;API developers in JS and TS&lt;/p&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Cyber security basics&lt;/li&gt;&lt;li&gt;OWASP API Security Top Ten&lt;/li&gt;&lt;li&gt;API1 - Broken Object Level Authorization&lt;/li&gt;&lt;li&gt;API2 - Broken Authentication&lt;/li&gt;&lt;li&gt;API3 - Broken Object Property Level Authorization&lt;/li&gt;&lt;li&gt;API4 - Unrestricted Resource Consumption&lt;/li&gt;&lt;li&gt;API5 - Broken Function Level Authorization&lt;/li&gt;&lt;li&gt;API6 - Unrestricted Access to Sensitive Business Flows&lt;/li&gt;&lt;li&gt;API7 - Server Side Request Forgery&lt;/li&gt;&lt;li&gt;API8 - Security Misconfiguration&lt;/li&gt;&lt;li&gt;API9 - Improper Inventory Management&lt;/li&gt;&lt;li&gt;API10 - Unsafe Consumption of APIs&lt;/li&gt;&lt;li&gt;Wrap up&lt;/li&gt;&lt;/ul&gt;</contents><objective_plain>- Getting familiar with essential cyber security concepts
- Understanding API security issues
- Detailed analysis of the OWASP API Security Top Ten elements
- Putting API security in the context of JS/TS
- Going beyond the low hanging fruits
- Managing vulnerabilities in third party components
- Input validation approaches and principles</objective_plain><essentials_plain>General JS/TS development</essentials_plain><audience_plain>API developers in JS and TS</audience_plain><contents_plain>- Cyber security basics
- OWASP API Security Top Ten
- API1 - Broken Object Level Authorization
- API2 - Broken Authentication
- API3 - Broken Object Property Level Authorization
- API4 - Unrestricted Resource Consumption
- API5 - Broken Function Level Authorization
- API6 - Unrestricted Access to Sensitive Business Flows
- API7 - Server Side Request Forgery
- API8 - Security Misconfiguration
- API9 - Improper Inventory Management
- API10 - Unsafe Consumption of APIs
- Wrap up</contents_plain><duration unit="d" days="3">3 jours</duration><pricelist><price country="DE" currency="EUR">2250.00</price><price country="SI" currency="EUR">2250.00</price><price country="AT" currency="EUR">2250.00</price><price country="SE" currency="EUR">2250.00</price><price country="CH" currency="CHF">2250.00</price></pricelist><miles/></course>