- »
- Certificates »
- Security: AppSec (47)
-
John's Security: AppSec Certificates
- Strategy
- Security Framework: NIST CSF from Pluralsight by Mike Woolard
- CSSLP
- Secure Software Concepts for CSSLP® from Pluralsight by Kevin Henry
- Secure Software Implementation for CSSLP® from Pluralsight by Kevin Henry
- Secure Software Testing for CSSLP® from Pluralsight by Kevin Henry
- Secure Software Supply Chain for CSSLP® from Pluralsight by Kevin Henry
- Developer Security Champion
- Introduction to Security Champion for Developers from Pluralsight by Kat DeLorean Seymour
- Developer Security Champion: OWASP Top 10 from Pluralsight by Kat DeLorean Seymour
- Developer Security Champion: API Security from Pluralsight by Gavin Johnson-Lynn
- Developer Security Champion: Data Protection Standards from Pluralsight by Kevin James
- Developer Security Champion: Encrypted Communications from Pluralsight by Henry Been
- Developer Security Champion: Secure Authentication Implementation from Pluralsight by Gavin Johnson-Lynn
- Developer Security Champion: Vulnerability Testing from Pluralsight by Christian Wenz
- Programming
- OWASP Top 10: Broken Access Control from Codecademy
- OWASP Top 10: Identification and Authentication Failures from Codecademy
- Learn about CSRF Attacks from Codecademy
- OWASP Top 10 from Snyk
- Snyk Top 10 from Snyk
- Security for Developers from Snyk
- Access
- Introduction to OAuth 2.0 and OpenID Connect from Pragmatic Web Security by Dr. Philippe De Ryck
- OAuth2 and OpenID Connect: Easy Now from Pluralsight by Roland Guijt
- API
- API Security Architect from API Academy
- Software Supply Chain Security (SSCS)
- Secure Coding: Using Components with Known Vulnerabilities from Pluralsight by Peter Mosmans
- Security Hot Takes: SBOMs from Pluralsight by Aaron Rosenmund, Brandon DeVault
- Saviynt Supply Chain Risk Management Training from KnowBe4
- Container Security
- Painless Vulnerability Management from Chainguard
- Container Infrastructure Analysis with Trivy from Pluralsight by Zach Roof
- Kubernetes
- Kubernetes Security: Cluster Setup from Pluralsight by Antonio Jesús Piedra
- Kubernetes Security: Cluster Hardening from Pluralsight by Erik Whitaker
- Kubernetes Security: Minimizing Microservice Vulnerabilities from Pluralsight by Justin Boyer
- Kubernetes Security: Implementing Supply Chain Security from Pluralsight by Antonio Jesús Piedra
- DevOps
- Certified DevOps Information Security Engineer (DevOps-SEC) from DevOps Academy
- SecOps
- Red Team Operations: Target and Capability Development from Pluralsight by Aaron Rosenmund
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK from Pluralsight by Aaron Rosenmund
- Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques from Pluralsight by Aaron Rosenmund
- Detect, Prioritize, and Remediate Cloud Security Risks with Datadog CSM from Datadog
- AWS
- AWS: Identity and Access Management from Whizlabs
- Introduction to AWS Identity and Access Management (IAM) from Simplilearn
- Introduction to AWS Trusted Advisor from Simplilearn
- Getting Started with AWS Security Hub from Simplilearn
- Introduction to AWS Security Token Services (STS) from Simplilearn
- Getting Started with AWS Control Tower from Simplilearn
- Snyk
- Application Analysis with Snyk from Pluralsight by Hiren Gadhvi
- Vulnerability Examples
- Apache Commons Text Vulnerability: What You Should Know from Pluralsight by Bri Frost, Brandon DeVault
- Atlassian RCE Vulnerabilities: What You Should Know from Pluralsight by Michael Teske, Matthew Lloyd Davies
- Log4j Vulnerability: What You Should Know from Pluralsight by Bri Frost, Brandon DeVault
- regreSSHion - an OpenSSH RCE Vulnerability: What You Should Know from Pluralsight by Michael Teske, Matthew Lloyd Davies
- XZ Backdoor Supply Chain Vulnerability: What You Should Know from Pluralsight by Aaron Rosenmund, Matthew Lloyd Davies
Strategy (1)
Security Framework: NIST CSF from Pluralsight by Mike Woolard
CSSLP (4)
Secure Software Concepts for CSSLP® from Pluralsight by Kevin Henry
Secure Software Implementation for CSSLP® from Pluralsight by Kevin Henry
Secure Software Testing for CSSLP® from Pluralsight by Kevin Henry
Secure Software Supply Chain for CSSLP® from Pluralsight by Kevin Henry
Developer Security Champion (7)
Introduction to Security Champion for Developers from Pluralsight by Kat DeLorean Seymour
Developer Security Champion: OWASP Top 10 from Pluralsight by Kat DeLorean Seymour
Developer Security Champion: API Security from Pluralsight by Gavin Johnson-Lynn
Developer Security Champion: Data Protection Standards from Pluralsight by Kevin James
Developer Security Champion: Encrypted Communications from Pluralsight by Henry Been
Developer Security Champion: Secure Authentication Implementation from Pluralsight by Gavin Johnson-Lynn
Developer Security Champion: Vulnerability Testing from Pluralsight by Christian Wenz
Programming (6)
OWASP Top 10: Broken Access Control from Codecademy
OWASP Top 10: Identification and Authentication Failures from Codecademy
Learn about CSRF Attacks from Codecademy
OWASP Top 10 from Snyk
Snyk Top 10 from Snyk
Security for Developers from Snyk
Access (2)
Introduction to OAuth 2.0 and OpenID Connect from Pragmatic Web Security by Dr. Philippe De Ryck
OAuth2 and OpenID Connect: Easy Now from Pluralsight by Roland Guijt
API (1)
API Security Architect from API Academy
Software Supply Chain Security (SSCS) (3)
Secure Coding: Using Components with Known Vulnerabilities from Pluralsight by Peter Mosmans
Security Hot Takes: SBOMs from Pluralsight by Aaron Rosenmund, Brandon DeVault
Saviynt Supply Chain Risk Management Training from KnowBe4
Container Security (2)
Painless Vulnerability Management from Chainguard
Container Infrastructure Analysis with Trivy from Pluralsight by Zach Roof
Kubernetes (4)
Kubernetes Security: Cluster Setup from Pluralsight by Antonio Jesús Piedra
Kubernetes Security: Cluster Hardening from Pluralsight by Erik Whitaker
Kubernetes Security: Minimizing Microservice Vulnerabilities from Pluralsight by Justin Boyer
Kubernetes Security: Implementing Supply Chain Security from Pluralsight by Antonio Jesús Piedra
DevOps (1)
SecOps (4)
Red Team Operations: Target and Capability Development from Pluralsight by Aaron Rosenmund
AWS (6)
AWS: Identity and Access Management from Whizlabs
Introduction to AWS Identity and Access Management (IAM) from Simplilearn
Introduction to AWS Trusted Advisor from Simplilearn
Getting Started with AWS Security Hub from Simplilearn
Introduction to AWS Security Token Services (STS) from Simplilearn
Getting Started with AWS Control Tower from Simplilearn
Snyk (1)
Application Analysis with Snyk from Pluralsight by Hiren Gadhvi
Vulnerability Examples (5)
Apache Commons Text Vulnerability: What You Should Know from Pluralsight by Bri Frost, Brandon DeVault
Atlassian RCE Vulnerabilities: What You Should Know from Pluralsight by Michael Teske, Matthew Lloyd Davies
Log4j Vulnerability: What You Should Know from Pluralsight by Bri Frost, Brandon DeVault
regreSSHion - an OpenSSH RCE Vulnerability: What You Should Know from Pluralsight by Michael Teske, Matthew Lloyd Davies
XZ Backdoor Supply Chain Vulnerability: What You Should Know from Pluralsight by Aaron Rosenmund, Matthew Lloyd Davies