Foundational Business LearnerFoundational concepts about application security and its impact on organizations.(Video Only)Total Learning Path Duration: 4 hours and 8 minutesIntroduction to Security JourneyIntroduction to SecurityCore Security ConceptsAttacksAttackersThreat LandscapeThe Hacker MindsetSocial Engineering Security MythsSecurity Culture and MindsetData BreachesSecurity Business CasePrioritizing SecurityTranslating SecurityRisk Managment for AppSecPrivacy and Customer Data Protection Dealing with Vulnerabilities Security at HomeTips for Secure Remote Work OWASP Universe Knowledge Sources Threat Landscape: CloudIoT Threat LandscapeSecure Development LifecycleIntermediate Business LearnerIn-depth exploration of threat modeling, threats, and security controls. (Video Only)Total Learning Path Duration: 4 hours and 40 minutesSix Foundational Truths of Application SecuritySecurity Requirements Threat Modeling BasicsThreat Modeling Process Threat Modeling ExamplesThreat Modeling ManifestoInput Validation Output EncodingAuthentication TheoryAuthorization Theory Logging and Exception HandlingCryptographySoftware Supply Chain OWASP Top 10 | Part 1OWASP Top 10 | Part 2OWASP Top 10 | Part 3Injection: SQL and CommandCross Site Request Forgery (CSRF)Cross-Site Scripting (XSS) | Part 1Cross-Site Scripting (XSS) | Part 2Buffer Overflows and Remote Code Execution Denial of Service (DoS) Server-Side Request ForgeryInsecure CommunicationAdvanced: Business LearnerAdvanced application security topics for business learners covering DevSecOps, common weaknesses, testing tools, and secure design. (Video Only)Total Learning Path Duration: 4 hours and 57 minutesAppSec in an Agile World | Part 1AppSec in an Agile World | Part 2AppSec in a DevOps WorldSecurity Behaviors for DevOpsCWE Top 25 | Part 1CWE Top 25 | Part 2CWE Top 25 | Part 3CWE Top 25 | Part 4Static Application Security Testing (SAST)Dynamic Application Security Testing (DAST)Vulnerability ScanningNext Generation AppSec ToolsPenetration Testing and Bug Bounty Thinking like a Penetration TesterIntro to Secure Development Designing a Secure App or Product Secure Design Principles | Part 1Secure Design Principles | Part 2Secure Design Principles in Action: Part 1Secure Design Principles in Action: Part 2Intro to Secure CodingSecuring the Development Environment Protecting your Code Repository Secure the Release