John Wang's Site
Home
Innovation
Patents (3)
Awards
API (7)
Certificates
API (8)
Algorithms (3)
Artificial Intelligence (12)
Board of Directors (4)
Customer Service (4)
Data Science (3)
Design Thinking (4)
DevOps (10)
Leadership (5)
Machine Learning (13)
Management (14)
Management Consulting (7)
Marketing (1)
Nonprofit (7)
Product Management (9)
Programming (17)
Scrum (17)
Security (21)
Programming (6)
OWASP Top 10 from Snyk
Snyk Top 10 from Snyk
Security for Developers from Snyk
OWASP Top 10: Broken Access Control from Codecademy
OWASP Top 10: Identification and Authentication Failures from Codecademy
Learn about CSRF Attacks from Codecademy
OAuth 2.0 and OpenID Connect (OIDC) (2)
Introduction to OAuth 2.0 and OpenID Connect from Pragmatic Web Security by Dr. Philippe De Ryck
OAuth2 and OpenID Connect: Easy Now from Pluralsight by Roland Guijt
Artificial Intelligence (2)
AI Security from Lakera
Defending Against AI-Generated Attacks from Codecademy
API (1)
API Security Architect from API Academy
DevOps (2)
Certified DevOps Information Security Engineer (DevOps-SEC) from DevOps Academy
Container Infrastructure Analysis with Trivy from Pluralsight by Zach Roof
Mobile (1)
Protect Your Mobile Device from Attack from NonprofitReady
Email Protection (1)
Enterprise Protection/Privacy Accredited Engineer from Proofpoint
Information Technology (1)
Corporate Information Security Awareness from Proofpoint
AWS (4)
AWS: Identity and Access Management from Whizlabs
Introduction to AWS Identity and Access Management (IAM) from Simplilearn
Introduction to AWS Trusted Advisor from Simplilearn
Getting Started with AWS Security Hub from Simplilearn
Azure (1)
Microsoft Azure Identity and Security for Administrators: The Big Picture from Pluralsight by Jean Francois Landry
Strategy (5)
TED Talks (6)
John Wang's Site
Certificates
Security (21)
John's Security Certificates
Programming
OWASP Top 10 from Snyk
Snyk Top 10 from Snyk
Security for Developers from Snyk
OWASP Top 10: Broken Access Control from Codecademy
OWASP Top 10: Identification and Authentication Failures from Codecademy
Learn about CSRF Attacks from Codecademy
OAuth 2.0 and OpenID Connect (OIDC)
Introduction to OAuth 2.0 and OpenID Connect from Pragmatic Web Security by Dr. Philippe De Ryck
OAuth2 and OpenID Connect: Easy Now from Pluralsight by Roland Guijt
Artificial Intelligence
AI Security from Lakera
Defending Against AI-Generated Attacks from Codecademy
API
API Security Architect from API Academy
DevOps
Certified DevOps Information Security Engineer (DevOps-SEC) from DevOps Academy
Container Infrastructure Analysis with Trivy from Pluralsight by Zach Roof
Mobile
Protect Your Mobile Device from Attack from NonprofitReady
Email Protection
Enterprise Protection/Privacy Accredited Engineer from Proofpoint
Information Technology
Corporate Information Security Awareness from Proofpoint
AWS
AWS: Identity and Access Management from Whizlabs
Introduction to AWS Identity and Access Management (IAM) from Simplilearn
Introduction to AWS Trusted Advisor from Simplilearn
Getting Started with AWS Security Hub from Simplilearn
Azure
Microsoft Azure Identity and Security for Administrators: The Big Picture from Pluralsight by Jean Francois Landry
Programming (6)
OWASP Top 10 from Snyk
Snyk Top 10 from Snyk
Security for Developers from Snyk
OWASP Top 10: Broken Access Control from Codecademy
OWASP Top 10: Identification and Authentication Failures from Codecademy
Learn about CSRF Attacks from Codecademy
OAuth 2.0 and OpenID Connect (OIDC) (2)
Introduction to OAuth 2.0 and OpenID Connect from Pragmatic Web Security by Dr. Philippe De Ryck
John's Pragmatic Web Security online profile
OAuth2 and OpenID Connect: Easy Now from Pluralsight by Roland Guijt
Artificial Intelligence (2)
AI Security from Lakera
John's Lakera online credential
Defending Against AI-Generated Attacks from Codecademy
API (1)
API Security Architect from API Academy
DevOps (2)
Certified DevOps Information Security Engineer (DevOps-SEC) from DevOps Academy
John's DevOps Academy online credential
Container Infrastructure Analysis with Trivy from Pluralsight by Zach Roof
Mobile (1)
Protect Your Mobile Device from Attack from NonprofitReady
Email Protection (1)
Enterprise Protection/Privacy Accredited Engineer from Proofpoint
Information Technology (1)
Corporate Information Security Awareness from Proofpoint
AWS (4)
AWS: Identity and Access Management from Whizlabs
Introduction to AWS Identity and Access Management (IAM) from Simplilearn
Introduction to AWS Trusted Advisor from Simplilearn
Getting Started with AWS Security Hub from Simplilearn
Azure (1)
Microsoft Azure Identity and Security for Administrators: The Big Picture from Pluralsight by Jean Francois Landry
« Previous
Next »