Certified API Pentester

Certified Cloud Pentesting eXpert-AWS

Certified API Pentester
(C-APIPen)

The Certified API Pentester (C-APIPen) exam is an intermediate-level exam designed to test a candidate’s understanding of fundamental API security concepts. Candidates must be able to demonstrate practical knowledge to conduct an API pentest to pass this exam.

  • Practical
  • 4 Hours
  • Online
  • On-demand
  • Real world pentesting scenarios
£250

Our Candidates Say it Best

Reuel M

Reuel M

Penetration Tester & Security Consultant | C-APIPen

This one was different. Instead of a set path, you’re thrown into two APIs and expected to exploit them. No hand-holding. No rigid structure. Just you, the API, and your ability to discover, enumerate, and exploit.
The OWASP API Top 10 was a huge part of this. But knowing the list isn’t enough—you have to apply it in real-world scenarios.
Good challenge. Good learning. APIs aren’t going anywhere, so let’s keep breaking (and securing) them.

Er. Aftab Harun

Er. Aftab Harun

Penetration Tester | Threat Modelling | C-APIPen

With APIs being a prime target for attackers, this certification deepened my understanding of API security vulnerabilities, exploitation techniques, and defense mechanisms. From 𝐚𝐮𝐭𝐡𝐞𝐧𝐭𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐟𝐥𝐚𝐰s to 𝐢𝐧𝐣𝐞𝐜𝐭𝐢𝐨𝐧 𝐚𝐭𝐭𝐚𝐜𝐤𝐬 and 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬 𝐥𝐨𝐠𝐢𝐜 𝐚𝐛𝐮𝐬𝐞, the course provided hands-on experience in securing modern API architectures.
A big thanks to The SecOps Group. Looking forward to applying these skills to secure APIs and contribute to safer applications.

Daniel Șerbu

Daniel Șerbu

CyberSecurity | Testing | C-APIPen

This intermediate-level certification validates expertise in API security testing through a comprehensive 4-hour practical examination. The assessment required demonstrating proficiency in identifying critical API vulnerabilities, with particular emphasis on the OWASP API Security Top 10 framework.

Who should take this exam?

C-APIPen is intended to be taken by pentesters, application security architects, SOC analysts, red and blue team members and any security enthusiasts, who want to evaluate and advance their knowledge.

What is the format of the exam?

C-APIPen is an intense 4 hour long practical exam. It requires candidates to solve a number of challenges, identify and exploit various vulnerabilities and obtain flags. The exam can be taken online, anytime (on-demand) and from anywhere. Candidates will need to connect to the exam VPN server to access the vulnerable applications.

What are the pass criteria for the exam?

The pass criteria are as follows:

  • Candidates scoring over 60% marks will be deemed to have successfully passed the exam.
  • Candidates scoring over 75% marks will be deemed to have passed with merit.

What is the experience needed to take the exam?

This is an intermediate-level exam. Candidates should have prior knowledge and experience of API pentesting. They should have an understanding of common API security-related topics such as the OWASP Top 10 API Security Risks, commonly identified security misconfigurations, and best security practices. They should be able to demonstrate their practical knowledge of API pentesting by completing a series of tasks on identifying and exploiting vulnerabilities that have been created in the exam environment to mimic real-world scenarios.

Note: As this is an intermediate-level exam, a minimum of two years of professional pentesting/bug-bounty experience is recommended.

What will the candidates get?

On completing the exam, each candidate will receive:

  • A certificate with their pass/fail and merit status.
  • The certificate will contain a certificate number, which can be used by anyone to validate the certificate.

What is the exam retake policy?

Candidates, who fail the exam, are allowed 1 free exam retake within the exam fees.

What are the benefits of this exam?

The certificate will allow candidates to demonstrate their understanding of API security topics. This will help them to advance in their career.

How long is the certificate valid for?

The certificate does not have an expiration date. However, the passing certificate will mention the details of the exam such as the exam version and the date. As the exam is updated over time, candidates should retake the newer version as per their convenience.

Will you provide any training that can be taken before the exam?

Being an independent certifying authority, we (The SecOps Group) do not provide any training for the exam. Candidates should carefully go over each topic listed in the syllabus and make sure they have adequate understanding, required experience and practical knowledge of these topics. Further, the following independent resources can be utilised to prepare for the exams.

Learning Resources

Portswigger

Free/Paid:free

Type:Training

Kontra

Free/Paid:free

Type:Training

TryHackMe

Free/Paid:free

Type:Training

HackTheBox

Free/Paid:both

Type:Training

Pentesterlab

Free/Paid:both

Type:Training

OWASP

Free/Paid:free

Type:Training

Node API Goat

Free/Paid:free

Type:Training

Rest API Goat

Free/Paid:free

Type:Training

Vulnapi

Free/Paid:free

Type:Training

Vapi

Free/Paid:free

Type:Training

SQLI-Labs

Free/Paid:free

Type:Training

Exam Syllabus

 

Using Swagger files to view and interact with API definitions

 

Import and manage API collections in Postman

 

Identification and Exploitation of OWASP API Security Top 10 Vulnerabilities

 

XML External Entity attack

 

Server Side Template Injection (SSTI)

 

Server-Side Request Forgery (SSRF)

 

Injection Attacks

  • SQL Injection
  • NoSQL Injection
  • Code & Command Injection
 

Authentication related Vulnerabilities

  • Brute force attacks and password spraying
  • Password reset attacks
 

Authorization and Session Management related flaws –

  • Insecure Direct Object Reference (IDOR)
  • Parameter Manipulation attacks
  • JWT related attacks
 

Insecure File Uploads

 

Business Logic Flaws

 

Directory Traversal Vulnerabilities

 

Mass Assignment and Rate Limiting related Vulnerabilities

 

API Enumeration and Fuzzing using scripts

 

Web Service Description Language (WSDL) Attacks

 

XML Injection in REST/SOAP APIs

 

GraphQL Attacks

 

Bypassing CORS Restrictions

 

Common Security Misconfigurations

 

Security Best Practices and Hardening Mechanisms