Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Debdatta Sarkar's Credentials
- Debdatta Sarkar's Wallet
- Data Structures & Algorithms in Python: Fundamental Data Structures
- Generative AI APIs for Practical Applications: An Introduction
- OWASP Top 10: Securing Web Applications
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A01:2021-Broken Access Control
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A03:2021-Injection
- CISSP: Software Development Security
- Cloud Security Fundamentals: Cloud Application Security
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A5 - Broken Access Control
- A7 and A6: Leaky and Unprepared Applications
- A10 and A9: API and Component Attacks
- A5 and A1: Security and Injection
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- A4 and A2: Broken Applications
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: A4 - XML External Entities
- A8 and A3: Cross-Site Attacks
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- Top 10 List Items
- OWASP Top 10: Web Application Security
- OWASP Top 10: A1 - Injection
- OWASP Overview
- Application Security Awareness & Validation
- API Security
- Secure Application Architecture & IAM
- Software Testing for DevOps: DevOps Test Tools
- Jenkins for DevOps: Jenkins Configuration for DevOps
- Using Docker for DevOps: Introduction to Docker
- The Language of DevOps: DevOps Tools & Processes
- Cloud Computing Fundamentals: Introduction
- SOLID & GRASP
- Debdatta Sarkar's Transcript
- Debdatta Sarkar's Wallet
- About Accredible