Skip to content
  • There are no suggestions because the search field is empty.

Recommended Path: Native Developer

This article describes our Recommended Native Developer Paths.

Foundational: Native Developer

Foundational principles of application security for native developers. (Video + Hands On)

Total Learning Path Duration: 4 hours 24 minutes

Introduction to Security Journey

Introduction to Security

ClickJacking (HackEDU)

Core Security Concepts

Encoding (HackEDU)

Attacks

Attackers

Threat Landscape

Hashing (HackEDU)

The Hacker Mindset

Social Engineering

Security Myths

Security Culture and Mindset

Data Breaches

Privacy and Customer Data Protection

Encryption (HackEDU)

Dealing with Vulnerabilities

Secure Development Lifecycle

Six Foundational Truths of Application Security

Memory Managment Introduction (HackEDU)

Security Requirements

Secure Design Principles | Part 1

Secure Design Principles | Part 2

Threat Modeling Basics

Intermediate: Native Developer

Technical deep dive into the threats and security controls relevant to native developers (Video + Hands On)

Total Learning Path Duration: 5 hours 8 minutes

Threat Modeling Process

Threat Modeling Examples

Threat Modeling Manifesto

Threat Modeling (HackEDU)

Input Validation

Authentication Theory

Authorization Theory

Logging and Exception Handling

Cryptography

Encoding, Hashing, and Encryption (HackEDU)

Software Supply Chain

CWE Top 25 | Part 1

CWE Top 25 | Part 2

CWE Top 25 | Part 3

CWE Top 25 | Part 4

Buffer Overflow and Remote Code Execution

Stack Overflow (HackEDU)

Static Application Security Testing (SAST)

Static Application Security Testing (SAST) (HackEDU)

Dynamic Application Security Testing (DAST)

Dynamic Application Security Testing (DAST) (HackEDU)

Vulnerability Scanning

Next Generation AppSec Tools

Thinking Like a Penetration Tester

Advanced: C (Native Developer)

Secure application design, secure coding, and specialized C security topics, ranging from vulnerabilities, secure memory management, and secure programming techniques.(Video + Hands On)

Total Learning Path Duration: 5 hours 25 minutes

Intro to Secure Development

Designing a Secure App or Product

Secure Design Principles in Action: Part 1

Secure Design Principles in Action: Part 2

Intro to Secure Coding

Producing Clean, Maintaining, and Secure Code

Secure Coding Best Practices: Part 1

Secure Coding Best Practices: Part 2

Secure Code Review | Part 1

Secure Code Review | Part 2

C-C++: Intro and Specs

Format String (HackEDU)

C-C++: Classes of Vulns: Part 1

C-C++: Classes of Vulns: Part 2

C-C++: Classes of Vulns: Part 3

Heap Overflow (HackEDU)

C-C++: Anatomy of a Stack Buffer Overflow Exploit

C-C++: Exploiting Memory: Part 1

C-C++: Exploiting Memory: Part 2

Off-By-One (HackEDU)

C-C++: Secure Programming: Part 1

C-C++: Secure Programming: Part 2

C-C++: Secure Programming: Part 3

C-C++: Secure Programming: Part 4

Advanced: C++ (Native Developer)

Secure application design, secure coding, and specialized C++ security topics, ranging from vulnerabilities, secure memory, platform mitigations, and compiler optimizations.(Video + Hands On)

Total Learning Path Duration: 5 hours 30 minutes

Intro to Secure Development

Designing a Secure App or Product

Secure Design Principles in Action: Part 1

Secure Design Principles in Action: Part 2

Intro to Secure Coding

Producing Clean, Maintaining, and Secure Code

Secure Coding Best Practices: Part 1

Secure Coding Best Practices: Part 2

Secure Code Review | Part 1

Secure Code Review | Part 2

C-C++: Intro and Specs

C-C++: Classes of Vulns: Part 1

C-C++: Classes of Vulns: Part 2

C-C++: Classes of Vulns: Part 3

C-C++: Anatomy of a Stack Buffer Overflow Exploit

C-C++: Exploiting Memory: Part 1

C-C++: Exploiting Memory: Part 2

C-C++: Secure Programming: Part 1

C-C++: Secure Programming: Part 2

C-C++: Secure Programming: Part 3

C-C++: Secure Programming: Part 4

C-C++: Platform Mitigations

C-C++: Exploiting Numbers

C-C++: Undefined Behavior and Complier Optimization

Advanced: Embedded (Native Developer)

Secure application design, secure coding, and specialized Embedded security topics, ranging from the threat landscape, secure firmware development lifecycle, coding standards, threat modeling, and secure communications. (Video + Hands On)

Total Learning Path Duration: 5 hours 3 minutes

Intro to Secure Development

Designing a Secure App or Product

Secure Design Principles in Action: Part 1

Secure Design Principles in Action: Part 2

Intro to Secure Coding

Producing Clean, Maintaining, and Secure Code

Secure Coding Best Practices: Part 1

Secure Coding Best Practices: Part 2

Secure Code Review | Part 1

Secure Code Review | Part 2

Introduction to Embedded Security

Embedded Threat Landscape

Fundamentals of Secure Embedded Development

Secure Firmware Development Lifecycle

Secure Coding Standards for Embedded Software

Secure Coding Techniques for Embedded Systems | Part 1

Format String (HackEDU)

Secure Coding Techniques for Embedded Systems | Part 2

Heap Overflow (HackEDU)

Secure Coding Techniques for Embedded Systems | Part 3

Off-By-One (HackEDU)

Embedded Security Toolchain

Threat Modeling Embedded Systems

Secure Communications with Embedded Systems