Skip to main content
All CollectionsAssessments
Post-Assessment Training Recommendations
Post-Assessment Training Recommendations

This article provides training recommendations for learners; organized by Assessment Category and Assessment Topic areas.

A
Written by Ali Mazzotta
Updated over 3 weeks ago

Choosing Content after an Assessment

Not sure what to assign after completing an Assessment?

Security Journey recommends the lessons listed below, organized by Assessment category and Assessment topic areas.

Keep in mind, if you have time constraints and can't assign all lessons associated with a topic, we recommend assigning the first lesson listed. However, our recommendation is to follow up with all lessons listed for that topic.

Secure Coding

Topic

Recommended Lesson(s)

Race Condition

Risky Cryptographic Algorithm

Integer Overflow or Wraparound

Path Traversal

Improper Authentication

Improper Access Control

Code Injection

SQL Injection

Logging and Monitoring Failures

Server-Side Request Forgery

Software and Data Integrity Failure

Vulnerable and Outdated Compononetns

Use of Hard-coded Credentials

Insecure Design

Security Misconfiguration

Core Security Concepts

Secure Development & Design

Did this answer your question?