Site Map - skillsoft.digitalbadges.skillsoft.com
- User Authentication
- Subham Kumar Panda's Credentials
- Subham Kumar Panda's Wallet
- OWASP Top 10: A09:2021-Security Logging & Monitoring Failures
- OWASP Top 10: A10:2021-Server-Side Request Forgery (SSRF)
- Agile & TDD Best Practices for APIs: Test-driven Development Strategy
- OWASP Top 10: Securing Web Applications
- OWASP Top 10: A01:2021-Broken Access Control
- OWASP Top 10: A02:2021-Cryptographic Failures
- OWASP Top 10: A03:2021-Injection
- OWASP Top 10: A04:2021-Insecure Design
- OWASP Top 10: A05:2021-Security Misconfiguration
- OWASP Top 10: A06:2021-Vulnerable & Outdated Components
- OWASP Top 10: A07:2021-Identification & Authentication Failures
- OWASP Top 10: A08:2021-Software & Data Integrity Failures
- OWASP Top 10: A8 - Insecure Deserialization
- OWASP Top 10: A6 - Security Misconfiguration
- OWASP Top 10: A7 - Cross-site Scripting
- OWASP Top 10: A9 - Using Components with Known Vulnerabilities
- OWASP Top 10: A10 - Insufficient Logging & Monitoring
- OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
- OWASP Top 10: A1 - Injection
- OWASP Top 10: A2 - Broken Authentication
- OWASP Top 10: A4 - XML External Entities
- OWASP Top 10: Web Application Security
- OWASP Top 10: A3 - Sensitive Data Exposure
- OWASP Top 10: A5 - Broken Access Control
- Agile Test-Driven Development
- Automated Software Testing
- Cloud Security Fundamentals: Cloud Application Security
- Need for Design Patterns & the Principles Guiding Design Patterns
- Application Security Awareness & Validation
- API Security
- Secure Application Architecture & IAM
- Fundamentals
- Data Handling and Concurrency
- Data Security and Access Control
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding Practices
- A8 and A3: Cross-Site Attacks
- A5 and A1: Security and Injection
- A10 and A9: API and Component Attacks
- A7 and A6: Leaky and Unprepared Applications
- Top 10 List Items
- A4 and A2: Broken Applications
- Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
- Defensive Coding for JavaScript and HTML5
- Defensive Coding Fundamentals for JavaScript and HTML5
- OWASP Overview
- ITIL® 4 Foundation: Service Management Practices (Part 2)
- ITIL® 4 Foundation: Service Management Practices (Part 1)
- ITIL® 4 Foundation: Introduction
- ITIL® 4 Foundation: The Service Value Chain
- ITIL® 4 Foundation: General Management Practices
- ITIL® 4 Foundation: The Service Value System
- ITIL® 4 Foundation: Key Concepts of Service Management
- ITIL® 4 Foundation: Key Concepts
- ITIL® 4 Foundation: The Guiding Principles
- Web Design
- SOLID & GRASP
- Subham Kumar Panda's Transcript
- Subham Kumar Panda's Wallet
- About Accredible