CAPIJ — Certified API Junior (2025 Edition)
Start your API security journey with CAPIJ, a foundational certification that teaches core API concepts, basic security principles, and hands-on testing fundamentals. Perfect for junior engineers and those new to API security.
Introductory pricing — perfect for beginners Begin your API security journey
€0.00
What's inside the CAPIJ curriculum
- Foundation pack with study guides, learning objectives, and progress trackers.
- Introduction to REST APIs, basic HTTP methods, and API architecture fundamentals.
- Hands-on labs with common API tools like Postman, curl, and browser developer tools.
- Coverage of basic OWASP API security risks and common vulnerabilities.
- Step-by-step walkthroughs of API testing methodologies and documentation practices.
- Practice exercises, knowledge checks, and exam preparation guidance.
CAPIJ student reviews
Reviews are coming soon. Check back after we publish new CAPIJ testimonials.
CAPIJ syllabus overview
CAPIJ provides a structured introduction to API security, combining theory with practical exercises designed for learners starting their API testing journey.
Chapter 1 · Introduction to APIs
In today’s hyperconnected world, software applications rarely operate alone. They depend on Application Programming Interfaces (APIs) to exchange data, orchestrate workflows, and deliver seamless user experiences. This chapter explains what APIs are, why they matter, and how the two most common web styles—SOAP and REST—compare.
What is an API?
An API is a contract that defines the rules, protocols, and data formats that allow one software component to interact with another. Web APIs typically communicate over HTTP, enabling mobile apps, web services, and integrations to request data or trigger actions across distributed systems.
Why are APIs important?
APIs power modular architectures, accelerate development by reusing services, and enable third-party integrations. They also expand the attack surface if they are not secured properly, which is why this certification couples functionality with security throughout the syllabus.
SOAP vs. REST
SOAP is a strict protocol that uses XML envelopes and can be stateful, making it popular in enterprise environments. REST is an architectural style that leverages HTTP verbs and is typically stateless, often using JSON for payloads.
| Aspect | SOAP | REST |
|---|---|---|
| Protocol | Strict protocol | Architectural style |
| State | Can be stateful | Typically stateless |
| Message format | XML | JSON (commonly) |
| Error handling | <soap:Fault> | HTTP status codes |
| Complexity | More “heavyweight” | Generally simpler |
| Use cases | Legacy or enterprise apps | Modern web or mobile apps |
SOAP example
<soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope">
<soap:Body>
<m:GetStockPrice xmlns:m="http://www.example.org/stock">
<m:StockName>GOOG</m:StockName>
</m:GetStockPrice>
</soap:Body>
</soap:Envelope>
REST example
POST /stocks
{
"stock": "AAPL",
"price": "145.00"
}
API authentication & authorization
Learn how APIs validate and authorize callers using methods such as Basic Auth, API keys, Bearer tokens, OAuth 2.0, JSON Web Tokens (JWT), OpenID Connect, and both role-based (RBAC) and attribute-based (ABAC) access controls. We examine rate limiting, token leakage, man-in-the-middle threats, and IDOR risks to show how security decisions influence exposure.
API architectures
Explore monoliths vs. microservices, API gateways, serverless platforms, GraphQL schemas, stateful vs. stateless design, versioning strategies, and the importance of logging, monitoring, and documentation. Each topic highlights how architecture and governance choices affect security posture.
Documentation matters
Strong documentation drives safer integrations. We cover the critical components of good docs, the role of OpenAPI and Swagger, Postman collections, common documentation pitfalls, and how transparency balances with security expectations.
Chapter 2 · Tools to interact with an API
Master the tooling landscape used by pentesters, QA teams, and developers to exercise APIs. This chapter focuses on four core toolsets: cURL, Postman, SOAP UI, and Python.
cURL
Discover why cURL is the command-line workhorse for crafting HTTP requests, manipulating headers, handling authentication, and transferring files. You will practise GET and POST requests, custom headers, data formats, redirects, verbose output, cookies, and file operations.
Postman
Use Postman’s graphical interface to organise requests into collections, manage environments, collaborate with teams, automate tests with pre-request scripts and Newman, and simulate APIs with mock servers.
SOAP UI
Build SOAP and REST projects, import WSDLs, create assertions, run data-driven tests, extend functionality with Groovy scripts, and stand up mock services to mirror production behaviour for deeper validation.
Python
Employ Python’s requests library for automation, including authenticated requests, JSON handling,
query parameters, exception handling, file transfers, and session management. Learn where scripting fits in
automation, integration, data processing, and testing workflows.
Chapter 3 · The OWASP API Top 10 — 2019
Examine the 2019 OWASP API Security Top 10, understanding how each risk manifests, how to test for it, and how to remediate it. Real-world examples accompany every category.
- Broken Object Level Authorization: Identify BOLA conditions by enumerating object identifiers and enforcing server-side checks.
- Broken User Authentication: Evaluate password policies, session management, and MFA expectations.
- Excessive Data Exposure: Spot over-shared fields in responses and implement output filtering.
- Lack of Resource & Rate Limiting: Detect DoS or brute-force gaps and configure throttling.
- Broken Function Level Authorization: Prevent privilege escalation by validating roles and permissions on every endpoint.
- Mass Assignment: Guard against auto-binding vulnerabilities by whitelisting properties and using DTOs.
- Security Misconfiguration: Harden platforms by removing defaults, locking down services, and sanitising errors.
- Injection: Apply parameterisation and sanitisation to block SQL, NoSQL, and command injections.
- Improper Assets Management: Track and retire deprecated or test endpoints before attackers find them.
- Insufficient Logging & Monitoring: Instrument APIs so anomalies trigger alerts and evidence is preserved.
Chapter 4 · The OWASP API Top 10 — 2023
Update your threat models with the 2023 list of OWASP API risks. Learn what changed, how attackers exploit each weakness, and the mitigation controls modern platforms demand.
- BOLA: Revisit object-level authorization in multi-tenant and service-to-service contexts.
- Broken Authentication: Reinforce credential hygiene, token lifecycles, and adaptive MFA.
- Broken Object Property Level Authorization: Prevent property-level tampering and mass assignment.
- Unrestricted Resource Consumption: Enforce rate limits, payload size checks, and concurrency ceilings.
- Broken Function Level Authorization: Lock down privileged operations across orchestration layers.
- Unrestricted Access to Sensitive Business Flows: Protect high-impact endpoints with additional verification.
- Server-Side Request Forgery: Contain SSRF by validating outbound destinations and segmenting networks.
- Security Misconfiguration: Automate drift detection and apply least privilege in every environment.
- Improper Inventory Management: Maintain API inventories so deprecated services do not linger.
- Unsafe Consumption of APIs: Treat upstream services as untrusted, validating and sanitising responses.
Chapter 5 · API Pentesting Documentation
Pentesting success relies on thorough planning, reporting, and collaboration. This chapter covers the Test Plan, Test Report, and Test Debrief Meeting in depth.
Test Plan
Learn how to define scope, objectives, methodologies, and logistics. We explore NDA handling, documentation intake, and aligning on grey-box strategies using OWASP guidance.
Test Report
Build executive summaries, methodology narratives, detailed findings, and remediation recommendations. Sample structures illustrate how to present evidence for vulnerabilities like SQL injection, XSS, and IDOR.
Test Debrief Meeting
Facilitate debriefs that engage pentesters, developers, security teams, and stakeholders. The agenda emphasizes remediation timelines, lessons learned, and next steps.
Chapter 6 · API Firewalls – Essentials, Installation, and Bypass Techniques
Understand how API firewalls act as a specialised shield for web services, how to deploy them responsibly, and how ethical bypass testing strengthens defenses.
Essentials
Define API firewalls, their role in filtering malicious traffic, and the threats they address, from injection to broken authentication.
Installation
Compare deployment models (reverse proxy, sidecar/service mesh, inline appliance), configure rules, schema validation, rate limiting, authentication checks, and logging, then verify protections through testing.
Ethical bypass techniques
Review authorised testing tactics—input evasion, HTTP verb tampering, header manipulation, request smuggling—and the mitigations that keep defences resilient.
Chapter XTRA 001 · HTTP Request Methods
Build fluency in HTTP verbs—the foundation of RESTful design. We cover semantics, safety, idempotence, and best practices for methods such as GET, POST, PUT, PATCH, DELETE, HEAD, and OPTIONS.
- GET: Safe and idempotent retrieval of resources.
- POST: Non-idempotent creation or server-side processing.
- PUT: Idempotent replacement or creation of resources.
- PATCH: Partial updates, idempotent when designed carefully.
- DELETE: Idempotent removal of resources.
- HEAD & OPTIONS: Discover resource metadata and communication capabilities.
Additional coverage includes CONNECT, TRACE, WebDAV extensions, and guidance on choosing the right method, managing caching, payload size, and security controls like CSRF protection.
Chapter XTRA 002 · CVSS Scoring and Calculation
Learn the Common Vulnerability Scoring System (CVSS) v3.1 to communicate risk objectively. We break down Base, Temporal, and Environmental metrics, explain the formulas, and walk through a scoring example.
Understand exploitability metrics (Attack Vector, Attack Complexity, Privileges Required, User Interaction, Scope) and impact metrics (Confidentiality, Integrity, Availability). Then apply Temporal and Environmental adjustments to tailor scores to real-world contexts.
A worked SQL injection example demonstrates calculating Base, Temporal, and Environmental scores, reinforcing best practices like documenting assumptions, recomputing scores as conditions change, and leveraging official calculators.
CAPIJ frequently asked questions
Answers about the CAPIJ study experience and exam readiness.
We are gathering CAPIJ questions. Check back soon for new entries.