John's Security: AppSec Certificates

  1. Strategy
    1. Security Framework: NIST CSF from Pluralsight by Mike Woolard
  2. Programming
    1. OWASP Top 10: Broken Access Control from Codecademy
    2. OWASP Top 10: Identification and Authentication Failures from Codecademy
    3. Learn about CSRF Attacks from Codecademy
    4. OWASP Top 10 from Snyk
    5. Snyk Top 10 from Snyk
    6. Security for Developers from Snyk
  3. Access
    1. Introduction to OAuth 2.0 and OpenID Connect from Pragmatic Web Security by Dr. Philippe De Ryck
    2. OAuth2 and OpenID Connect: Easy Now from Pluralsight by Roland Guijt
  4. API
    1. API Security Architect from API Academy
  5. Software Supply Chain Security (SSCS)
    1. Secure Coding: Using Components with Known Vulnerabilities from Pluralsight by Peter Mosmans
    2. Secure Software Supply Chain for CSSLP from Pluralsight by Kevin Henry
  6. Kubernetes
    1. Kubernetes Security: Cluster Setup from Pluralsight by Antonio Jesús Piedra
    2. Kubernetes Security: Cluster Hardening from Pluralsight by Erik Whitaker
    3. Kubernetes Security: Minimizing Microservice Vulnerabilities from Pluralsight by Justin Boyer
    4. Kubernetes Security: Implementing Supply Chain Security from Pluralsight by Antonio Jesús Piedra
  7. DevOps
    1. Certified DevOps Information Security Engineer (DevOps-SEC) from DevOps Academy
    2. Container Infrastructure Analysis with Trivy from Pluralsight by Zach Roof
  8. SecOps
    1. Secure Software Testing for CSSLP® from Pluralsight by Kevin Henry
    2. Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK from Pluralsight by Aaron Rosenmund
    3. Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques from Pluralsight by Aaron Rosenmund
    4. Detect, Prioritize, and Remediate Cloud Security Risks with Datadog CSM from Datadog
  9. AWS
    1. AWS: Identity and Access Management from Whizlabs
    2. Introduction to AWS Identity and Access Management (IAM) from Simplilearn
    3. Introduction to AWS Trusted Advisor from Simplilearn
    4. Getting Started with AWS Security Hub from Simplilearn
    5. Introduction to AWS Security Token Services (STS) from Simplilearn
    6. Getting Started with AWS Control Tower from Simplilearn
  10. Snyk
    1. Application Analysis with Snyk from Pluralsight by Hiren Gadhvi
  11. Vulnerability Examples
    1. XZ Backdoor Supply Chain Vulnerability: What You Should Know from Pluralsight by Aaron Rosenmund, Matthew Lloyd Davies

Strategy (1)

Security Framework: NIST CSF from Pluralsight by Mike Woolard

John's Security Framework: NIST CSF from Pluralsight by Mike Woolard

Programming (6)

OWASP Top 10: Broken Access Control from Codecademy

John's OWASP Top 10: Broken Access Control from Codecademy

OWASP Top 10: Identification and Authentication Failures from Codecademy

John's OWASP Top 10: Identification and Authentication Failures from Codecademy

Learn about CSRF Attacks from Codecademy

John's Learn about CSRF Attacks from Codecademy

OWASP Top 10 from Snyk

John's OWASP Top 10 from Snyk

Snyk Top 10 from Snyk

John's Snyk Top 10 from Snyk

Security for Developers from Snyk

John's Security for Developers from Snyk

Access (2)

Introduction to OAuth 2.0 and OpenID Connect from Pragmatic Web Security by Dr. Philippe De Ryck

John's Introduction to OAuth 2.0 and OpenID Connect from Pragmatic Web Security by Dr. Philippe De Ryck

OAuth2 and OpenID Connect: Easy Now from Pluralsight by Roland Guijt

John's OAuth2 and OpenID Connect: Easy Now from Pluralsight by Roland Guijt

API (1)

API Security Architect from API Academy

John's API Security Architect from API Academy

Software Supply Chain Security (SSCS) (2)

Secure Coding: Using Components with Known Vulnerabilities from Pluralsight by Peter Mosmans

John's Secure Coding: Using Components with Known Vulnerabilities from Pluralsight by Peter Mosmans

Secure Software Supply Chain for CSSLP from Pluralsight by Kevin Henry

John's Secure Software Supply Chain for CSSLP from Pluralsight by Kevin Henry

Kubernetes (4)

Kubernetes Security: Cluster Setup from Pluralsight by Antonio Jesús Piedra

John's Kubernetes Security: Cluster Setup from Pluralsight by Antonio Jesús Piedra

Kubernetes Security: Cluster Hardening from Pluralsight by Erik Whitaker

John's Kubernetes Security: Cluster Hardening from Pluralsight by Erik Whitaker

Kubernetes Security: Minimizing Microservice Vulnerabilities from Pluralsight by Justin Boyer

John's Kubernetes Security: Minimizing Microservice Vulnerabilities from Pluralsight by Justin Boyer

Kubernetes Security: Implementing Supply Chain Security from Pluralsight by Antonio Jesús Piedra

John's Kubernetes Security: Implementing Supply Chain Security from Pluralsight by Antonio Jesús Piedra

DevOps (2)

Certified DevOps Information Security Engineer (DevOps-SEC) from DevOps Academy

John's Certified DevOps Information Security Engineer (DevOps-SEC) from DevOps Academy

Container Infrastructure Analysis with Trivy from Pluralsight by Zach Roof

John's Container Infrastructure Analysis with Trivy from Pluralsight by Zach Roof

SecOps (4)

Secure Software Testing for CSSLP® from Pluralsight by Kevin Henry

John's Secure Software Testing for CSSLP® from Pluralsight by Kevin Henry

Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK from Pluralsight by Aaron Rosenmund

John's Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK from Pluralsight by Aaron Rosenmund

Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques from Pluralsight by Aaron Rosenmund

John's Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques from Pluralsight by Aaron Rosenmund

Detect, Prioritize, and Remediate Cloud Security Risks with Datadog CSM from Datadog

John's Detect, Prioritize, and Remediate Cloud Security Risks with Datadog CSM from Datadog

AWS (6)

AWS: Identity and Access Management from Whizlabs

John's AWS: Identity and Access Management from Whizlabs

Introduction to AWS Identity and Access Management (IAM) from Simplilearn

John's Introduction to AWS Identity and Access Management (IAM) from Simplilearn

Introduction to AWS Trusted Advisor from Simplilearn

John's Introduction to AWS Trusted Advisor from Simplilearn

Getting Started with AWS Security Hub from Simplilearn

John's Getting Started with AWS Security Hub from Simplilearn

Introduction to AWS Security Token Services (STS) from Simplilearn

John's Introduction to AWS Security Token Services (STS) from Simplilearn

Getting Started with AWS Control Tower from Simplilearn

John's Getting Started with AWS Control Tower from Simplilearn

Snyk (1)

Application Analysis with Snyk from Pluralsight by Hiren Gadhvi

John's Application Analysis with Snyk from Pluralsight by Hiren Gadhvi

Vulnerability Examples (1)

XZ Backdoor Supply Chain Vulnerability: What You Should Know from Pluralsight by Aaron Rosenmund, Matthew Lloyd Davies

John's XZ Backdoor Supply Chain Vulnerability: What You Should Know from Pluralsight by Aaron Rosenmund, Matthew Lloyd Davies