Skip to content
  • There are no suggestions because the search field is empty.

Recommended Path: Data Scientist

This article describes our Recommended Data Scientist Path.

Our Data Scientist Path was designed for individuals who work in R to develop data processing pipelines, prepare analytical applications, design architecture, and create models for machine learning. Upon completing our learning paths, the Data Scientist Learner will be able to utilize secure coding principles within the SDLC to design secure applications while working in R.

The Data Scientist training content is organized into three progressive levels:

  • Data Scientist Foundational: Introduces the basics of application security, such as the different types of security vulnerabilities, the importance of secure coding practices, and the secure development lifecycle.
  • Data Scientist Intermediate: A technical deep dive into the threats and security controls relevant to data scientists, including OWASP Top 10, threat modeling, and security testing.
  • Data Scientist Advanced Path: Learners choose their language/technology/framework to move into more advanced topics with the opportunity to learn how to break and fix code in a real application environment.
    • R

Foundational: Data Scientist

Video Only | Total Learning Path Duration: 4 hours and 14 minutes

Introduction to Security Journey

Introduction to Security

Core Security Concepts

Attacks

Attackers

Threat Landscape

The Hacker Mindset

Social Engineering

Security Myths

Security Culture and Mindset

Data Breaches

Security Business Case

Prioritizing Security

Translating Security

Risk Managment for AppSec

Privacy and Customer Data Protection

Dealing with Vulnerabilities

Security at Home

Tips for Secure Remote Work

OWASP Universe

Knowledge Sources

Security Requirements

Secure Development Lifecycle

Six Foundational Truths of Application Security

Intermediate: Data Scientist

Video and Hands-on | Total Learning Path Duration: 4 hours and 53 minutes

Secure Design Principles | Part 1

Secure Design Principles | Part 2

Threat Modeling Basics

Threat Modeling Process

Threat Modeling (HackEDU)

Input Validation

Output Encoding

Authentication Theory

Authorization Theory

Logging and Exception Handeling

Cryptography

Software Supply Chain

OWASP Top 10 | Part 1

OWASP Top 10 | Part 2

OWASP Top 10 | Part 3

Injection: SQL and Command

Cross-Site Scripting (XSS) | Part 1

Cross-Site Scripting (XSS) | Part 2

Static Application Security Testing (SAST)

Static Application Security Testing (SAST) (HackEDU)

Dynamic Application Security Testing (DAST)

Dynamic Application Security Testing (DAST) (HackEDU)

Vulnerability Scanning

Penetration Testing and Bug Bounty

Advanced: R (Data Scientist)

Video and Hands-on | Total Learning Path Duration: 5 hours and 23 minutes

Intro to Secure Development

Designing a Secure App or Product

Secure Design Principles | Part 1

Secure Design Principles | Part 2

Intro to Secure Coding

Producing Clean, Maintainable, and Secure Code

Secure Coding Best Practices: Part 1

Secure Coding Best Practices: Part 2

Securing the Development Environment

Protecting your Code Repository

Secure the Release

Secure Code Review | Part 1

Secure Code Review | Part 2

Intro to R Security

The R Threat Landscape

Secure Coding with R | Part 1

Secure Coding with R | Part 2

Secure Coding with R | Part 3

Third-Party R Packages

Security Best Practices for R | Part 1

Security Best Practices for R | Part 2

Securing Shiny Apps | Part 1

Securing Shiny Apps | Part 2

Securing Shiny Servers