Category General
LEARNING PATH~2hrs 30mins
OWASP Top 10 risks for open source software
By completing these lessons, you'll learn about the benefits of open source software but also the security risks that come with it.
0% Completed
LESSON~15mins
False negatives and false positives
Understand what the meaning of false negatives and positives are in cyber security, how they pose major risks to an organization, and how to mitigate them as a developer.
0% Completed
LESSON~20mins
What is Protected Health Information (PHI)?
An introduction to Protected Health Information, HIPAA requirements, and what steps developers need to take to keep it secure.
0% Completed
LESSON~15mins
What does security by default mean?
This lesson covers the philosophy of security by default, why is it so important in protecting users, how to implement it, and what can happen if you don't.
0% Completed
LESSON~10mins
What are personal access tokens (PATs)?
Move beyond passwords. This lesson covers creating, scoping, and securely using Personal Access Tokens (PATs).
0% Completed
LESSON~15mins
What is CVSS?
Learn what CVSS scores mean, how they’re calculated, and how to use them to assess and prioritize security risks.
0% Completed