Skip to content
  • There are no suggestions because the search field is empty.

Recommended Path (Hands-On Only): Topics

This article describes Recommended (Hands-On Only) Topic Paths; including AI/LLM and more. 

Foundational: HackEDU: Authentication

Understand the threats and mitigation strategies around implementing authorization securely.

Hands-On Only | Total Learning Path Duration: 2 hours

 

Foundational: HackEDU: Authorization

Understand the threats and mitigation strategies around implementing authentication securely.

Hands-On Only | Total Learning Path Duration: 1 hour 45 minutes

 

Foundational: HackEDU: Cryptography

Learn about foundation topics of cryptography and practical applications for secret management.

Hands-On Only | Total Learning Path Duration: 2 hours 45 minutes

 

Foundational: HackEDU: Encryption Basics

Learn the concepts of encoding, hashing, and encryption.

Hands-On Only | Total Learning Path Duration: 1 hour

 

Foundational: HackEDU: Native Applications

Learn about native applications and memory vulnerabilities.

Hands-On Only | Total Learning Path Duration: 1 hour 15 minutes

 

Foundational: HackEDU: OAuth

Identify and remediate OAuth vulnerabilities.

Hands-On Only | Total Learning Path Duration: 30 minutes

 

Foundational: HackEDU: OWASP Top 10 for LLM Applications

The top 10 most critical vulnerabilities found in LLM applications. Understand these threats, learn remediation strategies, and improve the overall security posture of your LLM applications through these hands-on exercises.

Hands-On Only | Total Learning Path Duration: 3 hours

 

Foundational: HackEDU: Secure Password Management

Learn techniques for safeguarding passwords, and how to incorporate these techniques into an authentication scheme.

Hands-On Only | Total Learning Path Duration: 45 minutes

 

Foundational: HackEDU: Web Application Security Extended

Go beyond the basic OWASP Top 10 and learn more about other web vulnerabilities.

Hands-On Only | Total Learning Path Duration: 2 hours 30 minutes

 

Foundational: Secure Privilege Management

Explore privilege escalation risks, including incorrect role checks in web apps, setuid misconfigurations in Linux, container escape techniques, and database privilege escalation chains.

Hands-On Only | Total Learning Path Duration: 1 hour