Choosing Content after an Assessment
Not sure what to assign after completing an Assessment?
Security Journey recommends the lessons listed below, organized by Assessment category and Assessment topic areas.
Keep in mind, if you have time constraints and can't assign all lessons associated with a topic, we recommend assigning the first lesson listed. However, our recommendation is to follow up with all lessons listed for that topic.
Secure Coding
Topic | Recommended Lesson(s) |
Race Condition | |
Risky Cryptographic Algorithm | |
Integer Overflow or Wraparound | |
Path Traversal | |
Improper Authentication | |
Improper Access Control | |
Code Injection | |
SQL Injection | |
Logging and Monitoring Failures | |
Server-Side Request Forgery | |
Software and Data Integrity Failure | |
Vulnerable and Outdated Compononetns | |
Use of Hard-coded Credentials | |
Insecure Design | |
Security Misconfiguration |
Core Security Concepts
Topic | Recommended Lesson(s) |
Attack Terminology | |
Application and Product Security | |
Data Privacy | |
CIA Security Triad | |
Threat Actors | |
Security Organization and Community | |
Risk Terminology | |
Threat Terminology | |
Security Champions | |
Proactive Security | |
Security Threats and Impact |
Secure Development & Design
Topic | Recommended Lesson(s) |
DevSecOps - Build and Deployment | |
DevSecOps - Culture and Organization | |
DevSecOps - Implementation | |
DevSecOps - Information Gathering | |
DevSecOps - Test and Verification | |
SDLC - Metrics and Reporting | |
SDLC - PSIRT | |
SDLC - Security Best Practices | |
SDLC - Security Requirements | |
SDLC - Security Testing | |
SDLC - Third-Party Testing | |
STRIDE Methodology | |
Threat Modeling Process |