Post-Assessment Training Recommendations
This article provides training recommendations for learners; organized by Assessment Category and Assessment Topic areas.
Choosing Content after an Assessment
Not sure what to assign after a learner completes an Assessment?
Security Journey provides recommended follow-up lessons aligned to each Assessment category and topic area. These recommendations help reinforce concepts, address skill gaps, and deepen understanding based on how learners performed.
How to use the recommendations:
- Each Assessment topic includes a list of suggested lessons.
- If you are short on time and cannot assign all lessons in a topic, we recommend assigning at least the first lesson in the list.
- For the most effective learning experience, we recommend assigning all lessons associated with the topic whenever possible.
Use these curated lesson recommendations to build targeted post-Assessment learning paths and ensure learners receive the right content at the right time.
Secure Coding
Core Security Concepts
| Topic | Recommended Lesson(s) |
| Attack Terminology | Introduction to Security, Data Breaches, Attacks, Knowledge Sources |
| Application and Product Security | Core Security Concepts, Six Foundational Truths of Application Security, Software Supply Chain |
| Data Privacy | Privacy and Customer Data Protection, LINDDUN Privacy Threat Modeling |
| CIA Security Triad | Core Security Concepts |
| Threat Actors | Attackers, Social Engineering |
| Security Organization and Community | Prioritizing Security, Translating Security, Security Myths, OWASP Universe, Knowledge Sources |
| Risk Terminology | Risk Management for AppSec |
| Threat Terminology | Threat Landscape, Threat Landscape: Cloud |
| Security Champions | Security Culture and Mindset |
| Proactive Security | Security Business Case |
| Security Threats and Impact | Threat Landscape, Denial of Service (DoS), Social Engineering, Data Breaches |