Post-Assessment Training Recommendations
This article provides training recommendations for learners; organized by Assessment Category and Assessment Topic areas.
Choosing Content after an Assessment
Not sure what to assign after completing an Assessment?
Security Journey recommends the lessons listed below, organized by Assessment category and Assessment topic areas.
Keep in mind, if you have time constraints and can't assign all lessons associated with a topic, we recommend assigning the first lesson listed. However, our recommendation is to follow up with all lessons listed for that topic.
Secure Coding
Core Security Concepts
Topic | Recommended Lesson(s) |
Attack Terminology | Introduction to Security, Data Breaches, Attacks, Knowledge Sources |
Application and Product Security | Core Security Concepts, Six Foundational Truths of Application Security, Software Supply Chain |
Data Privacy | Privacy and Customer Data Protection, LINDDUN Privacy Threat Modeling |
CIA Security Triad | Core Security Concepts |
Threat Actors | Attackers, Social Engineering |
Security Organization and Community | Prioritizing Security, Translating Security, Security Myths, OWASP Universe, Knowledge Sources |
Risk Terminology | Risk Management for AppSec |
Threat Terminology | Threat Landscape, Threat Landscape: Cloud |
Security Champions | Security Culture and Mindset |
Proactive Security | Security Business Case |
Security Threats and Impact | Threat Landscape, Denial of Service (DoS), Social Engineering, Data Breaches |
Secure Development & Design