Foundational: OWASP Top 10 - Web ApplicationsTrain on the OWASP Top 10 threats to web applications. (Video + Hands On)Total Learning Path Duration: 4 hours and 42 minutesOWASP Top 10 | Part 1Broken Access Control (HackEDU)Cryptographic Failures (HackEDU)SQL Injection: Part 1 (HackEDU)SQL Injection: Part 2 (HackEDU)SQL Injection: Part 3 (HackEDU)Reflected Cross-Site Scripting (XSS) (HackEDU)DOM-Based Cross-Site Scripting (XSS) (HackEDU)Stored Cross-Site Scripting (XSS) (HackEDU)Command Injection (HackEDU)OWASP Top 10 | Part 2Insecure Design (HackEDU)XML External Entities (XXE) (HackEDU)Vulnerable and Outdated Components (HackEDU)Identification and Authentication Failures (HackEDU)OWASP Top 10 | Part 3Software and Data Integrity Failures (HackEDU)Security Logging and Monitoring Failures (HackEDU)Server-Side Request Forgery (SSRF) (HackEDU)Foundational: PCI-DSS Meet the developer training requirements to be PCI-DSS compliant. (Video + Hands On)Total Learning Path Duration: 5 hours and 24 minutesSecurity RequirementsSecure Development LifestyleThreat Modeling BasicsIntro to Secure CodingSecure Coding Best Practices: Part 1Secure Coding Best Practices: Part 2Static Application Security Testing (SAST)Dynamic Application Security Testing (DAST)Vulnerability ScanningSecure Coding Review | Part 1Secure Coding Review | Part 2OWASP Top 10 | Part 1Broken Access Control (HackEDU)Cryptographic Failures (HackEDU)Command Injection (HackEDU)OWASP Top 10 | Part 2Identification and Authentication Failures (HackEDU)OWASP Top 10 | Part 3Security Logging and Monitoring Failures (HackEDU)Server-Side Request Forgery (SSRF) (HackEDU)Software Supply ChainSecure the ReleaseSecuring the Development EnvironmentProtecting your Code RepositoryFoundational: Security AwarenessLearn the fundamentals of cybersecurity and the techniques to protect yourself from cyber threats. (Video Only)Total Learning Path Duration: 1 hour and 46 minutesAwareness: VocabularyAwareness: Myths and MisconceptionsAwareness: AttackersAwareness: Data BreachAwareness: Data SecurityAwareness: Human FactorsAwareness: PasswordsAwareness: Phishing 101Awareness: PrivacyAwareness: Social EngineeringAwareness: Mobile SecurityAwareness: Social MediaAwareness: SPAM or ScamAwareness: Travel SecurityAwareness: USB and Removable DevicesFoundational: White House Executive Order Meet training compliance in line with the requirements laid out in the White House Executive Order on Improving the Nation’s Cybersecurity. (Video Only)Total Learning Path Duration: 1 hours and 36 minutesSecure Coding Best Practices: Part 1Secure Coding Best Practices: Part 2Secure Design Principles | Part 1Secure Design Principles | Part 2Logging and Exception HandelingThe Five Cloud Security DisciplinesSoftware Supply ChainPrivacy and Customer Data Protection