Category General
LEARNING PATH~2hrs 30mins
OWASP Top 10 risks for open source software
By completing these lessons, you'll learn about the benefits of open source software but also the security risks that come with it.
0% Completed
LESSON~20mins
Post-quantum cryptography
This lesson delves into what makes current cryptographic methods inadequate in the face of quantum computers, and explains the new algorithms that we must use instead.
0% Completed
LESSON~15mins
Zero trust
In this lesson we will discuss what zero trust philosophy is and why it can be so effective at minimizing identity-based cyber attacks.
0% Completed
LESSON~15mins
Multi-factor authentication and privilege escalation
Learn about how multi-factor authentication can protect who has access to accounts, networks, data, etc., and how this plays a role in privilege escalation attacks.
0% Completed
LESSON~15mins
False negatives and false positives
Understand what the meaning of false negatives and positives are in cyber security, how they pose major risks to an organization, and how to mitigate them as a developer.
0% Completed
LESSON~20mins
Protected health information (PHI)
An introduction to Protected Health Information, HIPAA requirements, and what steps developers need to take to keep it secure.
0% Completed