- »
- Certificates »
- Security: AppSec (49)
-
John's Security: AppSec Certificates
- Strategy
- Security Framework: NIST CSF from Pluralsight by Mike Woolard
- CSSLP
- Secure Software Concepts for CSSLP® from Pluralsight by Kevin Henry
- Secure Software Implementation for CSSLP® from Pluralsight by Kevin Henry
- Secure Software Testing for CSSLP® from Pluralsight by Kevin Henry
- Secure Software Supply Chain for CSSLP® from Pluralsight by Kevin Henry
- Developer Security Champion
- Introduction to Security Champion for Developers from Pluralsight by Kat DeLorean Seymour
- Developer Security Champion: OWASP Top 10 from Pluralsight by Kat DeLorean Seymour
- Developer Security Champion: API Security from Pluralsight by Gavin Johnson-Lynn
- Developer Security Champion: Data Protection Standards from Pluralsight by Kevin James
- Developer Security Champion: Encrypted Communications from Pluralsight by Henry Been
- Developer Security Champion: Secure Authentication Implementation from Pluralsight by Gavin Johnson-Lynn
- Developer Security Champion: Vulnerability Testing from Pluralsight by Christian Wenz
- Programming
- OWASP Top 10: Broken Access Control from Codecademy
- OWASP Top 10: Identification and Authentication Failures from Codecademy
- Learn about CSRF Attacks from Codecademy
- OWASP Top 10 from Snyk
- Snyk Top 10 from Snyk
- Security for Developers from Snyk
- Access
- Introduction to OAuth 2.0 and OpenID Connect from Pragmatic Web Security by Dr. Philippe De Ryck
- OAuth2 and OpenID Connect: Easy Now from Pluralsight by Roland Guijt
- API
- API Security Architect from API Academy
- Software Supply Chain Security (SSCS)
- Secure Coding: Using Components with Known Vulnerabilities from Pluralsight by Peter Mosmans
- Security Hot Takes: SBOMs from Pluralsight by Aaron Rosenmund, Brandon DeVault
- Saviynt Supply Chain Risk Management Training from KnowBe4
- Container Security
- Painless Vulnerability Management from Chainguard
- NeuVector Basics from Rancher Academy
- Container Infrastructure Analysis with Trivy from Pluralsight by Zach Roof
- Kubernetes
- Kubernetes Security: Cluster Setup from Pluralsight by Antonio Jesús Piedra
- Kubernetes Security: Cluster Hardening from Pluralsight by Erik Whitaker
- Kubernetes Security: Minimizing Microservice Vulnerabilities from Pluralsight by Justin Boyer
- Kubernetes Security: Implementing Supply Chain Security from Pluralsight by Antonio Jesús Piedra
- DevOps
- Certified DevOps Information Security Engineer (DevOps-SEC) from DevOps Academy
- SecOps
- Detect, Prioritize, and Remediate Cloud Security Risks with Datadog CSM from Datadog
- Getting Started with APM Metrics & Traces from Datadog
- Red Team Operations: Target and Capability Development from Pluralsight by Aaron Rosenmund
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK from Pluralsight by Aaron Rosenmund
- Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques from Pluralsight by Aaron Rosenmund
- AWS
- AWS: Identity and Access Management from Whizlabs
- Introduction to AWS Identity and Access Management (IAM) from Simplilearn
- Introduction to AWS Trusted Advisor from Simplilearn
- Getting Started with AWS Security Hub from Simplilearn
- Introduction to AWS Security Token Services (STS) from Simplilearn
- Getting Started with AWS Control Tower from Simplilearn
- Snyk
- Application Analysis with Snyk from Pluralsight by Hiren Gadhvi
- Vulnerability Examples
- Apache Commons Text Vulnerability: What You Should Know from Pluralsight by Bri Frost, Brandon DeVault
- Atlassian RCE Vulnerabilities: What You Should Know from Pluralsight by Michael Teske, Matthew Lloyd Davies
- Log4j Vulnerability: What You Should Know from Pluralsight by Bri Frost, Brandon DeVault
- regreSSHion - an OpenSSH RCE Vulnerability: What You Should Know from Pluralsight by Michael Teske, Matthew Lloyd Davies
- XZ Backdoor Supply Chain Vulnerability: What You Should Know from Pluralsight by Aaron Rosenmund, Matthew Lloyd Davies
Strategy (1)
Security Framework: NIST CSF from Pluralsight by Mike Woolard

CSSLP (4)
Secure Software Concepts for CSSLP® from Pluralsight by Kevin Henry

Secure Software Implementation for CSSLP® from Pluralsight by Kevin Henry

Secure Software Testing for CSSLP® from Pluralsight by Kevin Henry

Secure Software Supply Chain for CSSLP® from Pluralsight by Kevin Henry

Developer Security Champion (7)
Introduction to Security Champion for Developers from Pluralsight by Kat DeLorean Seymour

Developer Security Champion: OWASP Top 10 from Pluralsight by Kat DeLorean Seymour

Developer Security Champion: API Security from Pluralsight by Gavin Johnson-Lynn

Developer Security Champion: Data Protection Standards from Pluralsight by Kevin James

Developer Security Champion: Encrypted Communications from Pluralsight by Henry Been

Developer Security Champion: Secure Authentication Implementation from Pluralsight by Gavin Johnson-Lynn

Developer Security Champion: Vulnerability Testing from Pluralsight by Christian Wenz

Programming (6)
OWASP Top 10: Broken Access Control from Codecademy

OWASP Top 10: Identification and Authentication Failures from Codecademy

Learn about CSRF Attacks from Codecademy

OWASP Top 10 from Snyk

Snyk Top 10 from Snyk

Security for Developers from Snyk

Access (2)
Introduction to OAuth 2.0 and OpenID Connect from Pragmatic Web Security by Dr. Philippe De Ryck

OAuth2 and OpenID Connect: Easy Now from Pluralsight by Roland Guijt

API (1)
API Security Architect from API Academy

Software Supply Chain Security (SSCS) (3)
Secure Coding: Using Components with Known Vulnerabilities from Pluralsight by Peter Mosmans

Security Hot Takes: SBOMs from Pluralsight by Aaron Rosenmund, Brandon DeVault

Saviynt Supply Chain Risk Management Training from KnowBe4


Container Security (3)
Painless Vulnerability Management from Chainguard

NeuVector Basics from Rancher Academy

Container Infrastructure Analysis with Trivy from Pluralsight by Zach Roof

Kubernetes (4)
Kubernetes Security: Cluster Setup from Pluralsight by Antonio Jesús Piedra

Kubernetes Security: Cluster Hardening from Pluralsight by Erik Whitaker

Kubernetes Security: Minimizing Microservice Vulnerabilities from Pluralsight by Justin Boyer

Kubernetes Security: Implementing Supply Chain Security from Pluralsight by Antonio Jesús Piedra

DevOps (1)

SecOps (5)

Getting Started with APM Metrics & Traces from Datadog

Red Team Operations: Target and Capability Development from Pluralsight by Aaron Rosenmund



AWS (6)
AWS: Identity and Access Management from Whizlabs

Introduction to AWS Identity and Access Management (IAM) from Simplilearn

Introduction to AWS Trusted Advisor from Simplilearn

Getting Started with AWS Security Hub from Simplilearn

Introduction to AWS Security Token Services (STS) from Simplilearn

Getting Started with AWS Control Tower from Simplilearn

Snyk (1)
Application Analysis with Snyk from Pluralsight by Hiren Gadhvi

Vulnerability Examples (5)
Apache Commons Text Vulnerability: What You Should Know from Pluralsight by Bri Frost, Brandon DeVault

Atlassian RCE Vulnerabilities: What You Should Know from Pluralsight by Michael Teske, Matthew Lloyd Davies

Log4j Vulnerability: What You Should Know from Pluralsight by Bri Frost, Brandon DeVault

regreSSHion - an OpenSSH RCE Vulnerability: What You Should Know from Pluralsight by Michael Teske, Matthew Lloyd Davies

XZ Backdoor Supply Chain Vulnerability: What You Should Know from Pluralsight by Aaron Rosenmund, Matthew Lloyd Davies
