Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Secure AI: API and Dependency Risks

Coursera via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Secure AI: API and Dependency Risks is an intermediate course that moves you from developer to defender, teaching you the essential practices for building production-grade, secure AI. You will learn to implement OWASP ASVS guidelines to harden API endpoints with critical controls like JWT authentication, input validation to prevent injection attacks, and rate limiting. Then, you will adopt an attacker’s mindset, using DAST tools like OWASP ZAP to verify your defenses are effective. Next, you will master the art of managing your software supply chain by analyzing dependency vulnerability reports, using the CVSS framework to prioritize real threats over noise, and formulating verified hotfix and rollback plans. Through hands-on labs simulating real-world security incidents, you will leave this course ready to build, deploy, and maintain resilient AI services that can withstand modern threats.

Syllabus

  • API Security Implementation
    • This module focuses on the defensive programming needed to secure the entry points to AI services. You will understand why securing API endpoints is non-negotiable and how the OWASP ASVS provides a framework for resilience. You will learn how to implement JWT authentication and rigorous input validation to protect against injection attacks. Finally, you will apply a DAST tool to verify that your security controls are effective. By the end, you will be able to secure an AI memory retrieval endpoint against common web-based attacks.
  • Vulnerability Assessment and Remediation
    • The software supply chain, including AI frameworks like LangChain, is a critical vulnerability vector. This module moves you from defensive coding to systematic risk management. You will learn the "why" of continuous dependency monitoring, the "what" of interpreting a vulnerability report, and the "how" of using the CVSS framework to prioritize threats. Finally, you will apply this knowledge to formulate and execute a verified hotfix plan for a critical dependency, completing your journey from coder to security-aware developer.

Taught by

LearningMate

Reviews

Start your review of Secure AI: API and Dependency Risks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.