Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Piyush Pant's Credentials
- Piyush Pant's Wallet
- SCRUM Roles
- Scrum Master: Sprint Goals & Planning
- Scrum: Creating Effective Product Backlogs
- Scrum: Product Backlog
- Scrum Artifacts and Investment Guidelines
- Applying Scrum Development Practices
- Scrum: Product Development Framework
- Scrum Master: Scrum for the Team
- Product Development Practices
- Scrum Team Velocity: Exploring Team Velocity
- Transition to Scrum: Agile Foundation to Scrum
- Transitioning to Scrum
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- Final Exam: OWASP Top 10 Mitigations
- Track 1: OWASP Top 10 Mitigations
- Web App Vulnerability Analyst
- OWASP Top 10: A1 - Injection
- OWASP Top 10: Web Application Security
- Secure Versioning & Analysis
- Software Design Technologies
- Secure Implementation & Coding
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Supply Chain & Software Acquisition
- Secure Requirements
- Secure Risk, Vulnerabilities, & Exposure
- Secure Concepts
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Software Testing
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Technologies
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing Types
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Vulnerabilities
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Governance, Risk, and Compliance
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Lifecycle Management
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Testing for Security & Quality Assurance
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Software Deployment & Management
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Threat Modeling
- Defensive Programmer: Defensive Techniques
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Design Principles
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Data Classification
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Architectural Risk & Modeling
- Defensive Programmer: Defensive Concepts
- Defensive Programmer: Cryptography
- Secure Programmer: Coding Practices
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Privacy
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Abuse Cases & RTMs
- Secure Programmer: Software Testing
- Defensive Programmer: Advanced Concepts
- Secure Programmer: Software Design Techniques
- Secure Programmer: Software Modeling Techniques
- Introduction to Secure Programming
- Defensive Programmer: Code Samples
- Defensive Programmer: Secure Testing
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Design Principles
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Requirements
- Taking Your Team to the Next Level with Delegation
- Confronting Your Assumptions
- Managing a Project to Minimize Risk and Maximize Quality
- Secure Programmer: Intro to Programming Standards
- Piyush Pant's Transcript
- Piyush Pant's Wallet
- About Accredible