Foundational: Data ScientistFoundational principles of application security for data scientists. (Video Only)Total Learning Path Duration: 4 hours and 14 minutesIntroduction to Security JourneyIntroduction to SecurityCore Security ConceptsAttacksAttackersThreat LandscapeThe Hacker MindsetSocial EngineeringSecurity MythsSecurity Culture and MindsetData BreachesSecurity Business CasePrioritizing SecurityTranslating SecurityRisk Managment for AppSecPrivacy and Customer Data ProtectionDealing with VulnerabilitiesSecurity at HomeTips for Secure Remote WorkOWASP UniverseKnowledge SourcesSecurity RequirementsSecure Development LifecycleSix Foundational Truths of Application SecurityIntermediate: Data ScientistTechnical deep dive into the threats and security controls relevant to data scientist (Video + Hands On)Total Learning Path Duration: 4 hours and 53 minutesSecure Design Principles | Part 1Secure Design Principles | Part 2Threat Modeling BasicsThreat Modeling ProcessThreat Modeling (HackEDU)Input ValidationOutput EncodingAuthentication TheoryAuthorization TheoryLogging and Exception HandelingCryptographySoftware Supply ChainOWASP Top 10 | Part 1OWASP Top 10 | Part 2OWASP Top 10 | Part 3Injection: SQL and CommandCross-Site Scripting (XSS) | Part 1Cross-Site Scripting (XSS) | Part 2Static Application Security Testing (SAST)Static Application Security Testing (SAST) (HackEDU)Dynamic Application Security Testing (DAST)Dynamic Application Security Testing (DAST) (HackEDU)Vulnerability ScanningPenetration Testing and Bug BountyAdvanced: R (Data Scientist)Secure application design, secure coding, and specialized R security topics, ranging from the R threat landscape, best practices, and securing shiny apps and servers.(Video + Hands On)Total Learning Path Duration: 5 hours and 23 minutesIntro to Secure DevelopmentDesigning a Secure App or ProductSecure Design Principles | Part 1Secure Design Principles | Part 2Intro to Secure CodingProducing Clean, Maintainable, and Secure CodeSecure Coding Best Practices: Part 1Secure Coding Best Practices: Part 2Securing the Development EnvironmentProtecting your Code RepositorySecure the ReleaseSecure Code Review | Part 1Secure Code Review | Part 2Intro to R SecurityThe R Threat LandscapeSecure Coding with R | Part 1Secure Coding with R | Part 2Secure Coding with R | Part 3Third-Party R PackagesSecurity Best Practices for R | Part 1Security Best Practices for R | Part 2Securing Shiny Apps | Part 1Securing Shiny Apps | Part 2Securing Shiny Servers