Recommended Paths (Video and Hands On): Compliance
This article describes our Recommended Compliance Paths.
Easily meet and report on compliance goals with short, focused paths to make the most of your development team's valuable time.
Learners are rewarded with a certificate at the end of each path.
ISO 27001
ISO 27001 is an international standard for information security management that defines the security requirements for an information security management system (ISMS). (Video + Hands On)
Total Learning Path Duration: 4 hours
Secure Coding Best Practices: Part 1
Secure Coding Best Practices: Part 2
Vulnerable and Outdated Components
Identification and Authentication Failures
Software Data and Integrity Failures
Security Logging and Monitoring Failures
Server-side Request Forgery (SSRF)
OWASP Top 10 - Web Applications
Train on the OWASP Top 10 threats to web applications. (Video + Hands On)
Total Learning Path Duration: 4 hours and 42 minutes
Reflected Cross-Site Scripting (XSS)
DOM-Based Cross-Site Scripting (XSS)
Stored Cross-Site Scripting (XSS)
Vulnerable and Outdated Components
Identification and Authentication Failures
Software and Data Integrity Failures
Security Logging and Monitoring Failures
Server-Side Request Forgery (SSRF)
PCI-DSS
Meet the developer training requirements to be PCI-DSS compliant. (Video + Hands On)
Total Learning Path Duration: 5 hours and 24 minutes
Secure Coding Best Practices: Part 1
Secure Coding Best Practices: Part 2
Static Application Security Testing (SAST)
Dynamic Application Security Testing (DAST)
Identification and Authentication Failures
Security Logging and Monitoring Failures
Server-Side Request Forgery (SSRF)
Securing the Development Environment
Protecting your Code Repository
Security Awareness
Learn the fundamentals of cybersecurity and the techniques to protect yourself from cyber threats. (Video Only)
Total Learning Path Duration: 1 hour and 46 minutes
Awareness: Myths and Misconceptions
Awareness: USB and Removable Devices
White House Executive Order
Meet training compliance in line with the requirements laid out in the White House Executive Order on Improving the Nation’s Cybersecurity. (Video Only)
Total Learning Path Duration: 1 hours and 36 minutes
Secure Coding Best Practices: Part 1
Secure Coding Best Practices: Part 2
Secure Design Principles | Part 1
Secure Design Principles | Part 2
Logging and Exception Handeling
The Five Cloud Security Disciplines
Privacy and Customer Data Protection