Skip to content
  • There are no suggestions because the search field is empty.

Recommended Path: Privacy Engineer

This article describes our Recommended Privacy Engineer Paths.

 

Foundational: Privacy Engineer (Privacy Engineer)

Learn the foundational concepts about application security and its impact on organizations. (Video Only)

Total Learning Path Duration: 4 hours 8 minutes

Introduction to Security Journey

Introduction to Security

Core Security Concepts

Attacks

Attackers

Threat Landscape

The Hacker Mindset

Social Engineering

Security Myths

Security Culture and Mindset

Data Breaches

Security Business Case

Prioritizing Security

Dealing with Vulnerabilities

Security at Home

Tips for Secure Remote Work

OWASP Universe

Knowledge Sources

Threat Landscape: Cloud

IoT Threat Landscape

Secure Development Lifecycle

Intermediate: Privacy Engineer (Privacy Engineer)

In-depth exploration of threat modeling, threats, and security controls. (Video + Hands On)

Total Learning Path Duration: 4 hours 46 minutes

Six Foundational Truths of Application Security

Security Requirements

Threat Modeling Basics

Threat Modeling Process

Threat Modeling Examples

Threat Modeling Manifesto

Threat Modeling (HackEDU)

Input Validation

Output Encoding

Authentication Theory

Authorization Theory

Logging and Exception Handling

Cryptography

Software Supply Chain

OWASP Top 10 | Part 1

OWASP Top 10 | Part 2

OWASP Top 10 | Part 3

Injection: SQL and Command

Cross Site Request Forgery (CSRF)

Cross-Site Scripting (XSS) | Part 1

Cross-Site Scripting (XSS) | Part 2

Buffer Overflows and Remote Code Execution

Denial of Service (DoS)

Server-Side Request Forgery

Advanced: Privacy Engineer (Privacy Engineer)

Start with understanding common secure development practices and tools, then dive into privacy threat modeling and privacy by design. (Video Only)

Total Learning Path Duration: 4 hours 37 minutes

Thinking Like a Penetration Tester

Intro to Secure Development

Designing a Secure App or Product

Secure Design Principles | Part 1

Secure Design Principles | Part 2

AppSec in an Agile World | Part 1

AppSec in an Agile World | Part 2

AppSec in a DevOps World

Security Behaviors for DevOps

Static Application Security Testing (SAST)

Dynamic Application Security Testing (DAST)

Vulnerability Scanning

Next Generation AppSec Tools

Penetration Testing and Bug Bounty

LINDDUN Privacy Threat Modeling

LINDDUN Privacy Threat Modeling Process

PBD Seven Foundational Principles

PBD Requirements

PBD Privacy Engineering

PBD Risk Management

PBD Mobile

PBD Privacy by ReDesign