Recommended Path: Compliance
This article describes our Recommended Compliance Paths.
Foundational: OWASP Top 10 - Web Applications
Train on the OWASP Top 10 threats to web applications. (Video + Hands On)
Total Learning Path Duration: 4 hours and 42 minutes
Broken Access Control (HackEDU)
Cryptographic Failures (HackEDU)
SQL Injection: Part 1 (HackEDU)
SQL Injection: Part 2 (HackEDU)
SQL Injection: Part 3 (HackEDU)
Reflected Cross-Site Scripting (XSS) (HackEDU)
DOM-Based Cross-Site Scripting (XSS) (HackEDU)
Stored Cross-Site Scripting (XSS) (HackEDU)
XML External Entities (XXE) (HackEDU)
Vulnerable and Outdated Components (HackEDU)
Identification and Authentication Failures (HackEDU)
Software and Data Integrity Failures (HackEDU)
Security Logging and Monitoring Failures (HackEDU)
Server-Side Request Forgery (SSRF) (HackEDU)
Foundational: PCI-DSS
Meet the developer training requirements to be PCI-DSS compliant. (Video + Hands On)
Total Learning Path Duration: 5 hours and 24 minutes
Secure Coding Best Practices: Part 1
Secure Coding Best Practices: Part 2
Static Application Security Testing (SAST)
Dynamic Application Security Testing (DAST)
Broken Access Control (HackEDU)
Cryptographic Failures (HackEDU)
Identification and Authentication Failures (HackEDU)
Security Logging and Monitoring Failures (HackEDU)
Server-Side Request Forgery (SSRF) (HackEDU)
Securing the Development Environment
Protecting your Code Repository
Foundational: Security Awareness
Learn the fundamentals of cybersecurity and the techniques to protect yourself from cyber threats. (Video Only)
Total Learning Path Duration: 1 hour and 46 minutes
Awareness: Myths and Misconceptions
Awareness: USB and Removable Devices
Foundational: White House Executive Order
Meet training compliance in line with the requirements laid out in the White House Executive Order on Improving the Nation’s Cybersecurity. (Video Only)
Total Learning Path Duration: 1 hours and 36 minutes
Secure Coding Best Practices: Part 1
Secure Coding Best Practices: Part 2
Secure Design Principles | Part 1
Secure Design Principles | Part 2
Logging and Exception Handeling
The Five Cloud Security Disciplines
Privacy and Customer Data Protection