Category General
LESSON~20mins
Post-quantum cryptography
This lesson delves into what makes current cryptographic methods inadequate in the face of quantum computers, and explains the new algorithms that we must use instead.
0% Completed
LESSON~15mins
Zero trust
In this lesson we will discuss what zero trust philosophy is and why it can be so effective at minimizing identity-based cyber attacks.
0% Completed
LESSON~15mins
Multi-factor authentication and privilege escalation
Learn about how multi-factor authentication can protect who has access to accounts, networks, data, etc., and how this plays a role in privilege escalation attacks.
0% Completed
LESSON~15mins
False negatives and false positives
Understand what the meaning of false negatives and positives are in cyber security, how they pose major risks to an organization, and how to mitigate them as a developer.
0% Completed
LESSON~20mins
Protected health information (PHI)
An introduction to Protected Health Information, HIPAA requirements, and what steps developers need to take to keep it secure.
0% Completed
LESSON~15mins
Security by default
This lesson covers the philosophy of security by default, why is it so important in protecting users, how to implement it, and what can happen if you don't.
0% Completed