Recommended Path (Hands-On Only): Topics
This article describes Recommended (Hands-On Only) Topic Paths; including AI/LLM and more.
Foundational: HackEDU: Authentication
Understand the threats and mitigation strategies around implementing authorization securely.
Hands-On Only | Total Learning Path Duration: 2 hours
Foundational: HackEDU: Authorization
Understand the threats and mitigation strategies around implementing authentication securely.
Hands-On Only | Total Learning Path Duration: 1 hour 45 minutes
Foundational: HackEDU: Cryptography
Learn about foundation topics of cryptography and practical applications for secret management.
Hands-On Only | Total Learning Path Duration: 2 hours 45 minutes
Foundational: HackEDU: Encryption Basics
Learn the concepts of encoding, hashing, and encryption.
Hands-On Only | Total Learning Path Duration: 1 hour
Foundational: HackEDU: Native Applications
Learn about native applications and memory vulnerabilities.
Hands-On Only | Total Learning Path Duration: 1 hour 15 minutes
Foundational: HackEDU: OAuth
Identify and remediate OAuth vulnerabilities.
Hands-On Only | Total Learning Path Duration: 30 minutes
Foundational: HackEDU: OWASP Top 10 for LLM Applications
The top 10 most critical vulnerabilities found in LLM applications. Understand these threats, learn remediation strategies, and improve the overall security posture of your LLM applications through these hands-on exercises.
Hands-On Only | Total Learning Path Duration: 3 hours
Foundational: HackEDU: Secure Password Management
Learn techniques for safeguarding passwords, and how to incorporate these techniques into an authentication scheme.
Hands-On Only | Total Learning Path Duration: 45 minutes
Foundational: HackEDU: Web Application Security Extended
Go beyond the basic OWASP Top 10 and learn more about other web vulnerabilities.
Hands-On Only | Total Learning Path Duration: 2 hours 30 minutes
Foundational: Secure Privilege Management
Explore privilege escalation risks, including incorrect role checks in web apps, setuid misconfigurations in Linux, container escape techniques, and database privilege escalation chains.
Hands-On Only | Total Learning Path Duration: 1 hour