Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Saravanan Balu's Credentials
- Saravanan Balu's Wallet
- Cloud Security Fundamentals: Cloud Application Security
- OWASP Top 10: A1 - Injection
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: Web Application Security
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A5 - Broken Access Control
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- Automated Software Testing
- Need for Design Patterns & the Principles Guiding Design Patterns
- OWASP Overview
- Software Development Security
- Application Security Awareness & Validation
- API Security
- Secure Application Architecture & IAM
- SOLID & GRASP
- Saravanan Balu's Transcript
- Saravanan Balu's Wallet
- About Accredible