Learning Roadmap for the

Security Engineer

Attacking and Defending SQL Injection with Java Spring Boot
Attacking and Defending Persistent XSS with Java EE
Attacking and Defending Session Fixation with Java EE
Attacking and Defending XXE with Java EE
Implementing CSRF (Cross-Site Request Forgery) with Java EE
Attacking and Defending Insecure Deserialisation with Java EE
Attacking and Defending Insecure Deserialisation with Java EE
Attacking and Defending SSRF with Java EE
Attack and Defense SSRF With Django
Attacking and Defending SQL Injection with Java EE
VueJS: Content Security Policy Playground
ReactJS - Cross Site Scripting Playground
ReactJS - CSP Attack and Defense Playground
TLS and Encrypting Data in Transit
GRAPHQL Attack Vectors
Cross Origin Resource Sharing Playground
SAML Attack and Defense
Kotlin Security Playground
Swift Security Playground
Server-Side Request Forgery: Attack & Defense
Introduction to Web App Cryptography
Injections, XXE, and Insecure Deserialization
Cross-Site-Scripting Attack and Defense
Attacking and Defending Authentication & Access Control
Azure functions Security
Practical Azure Key Vault
Securing Network Access to Azure Virtual Machines
Introduction to Azure IAM
Introduction to Azure
Git 101
Jenkins Integration
DevSecOps with Gaia
Jenkins Security Best Practices
OSV Scanner Security Playground
Nuclei Automation for DevSecOps
DevSecOps with Gitlab CI
DAST with Jenkins
Static Analysis and Code Review for DevSecOps
Source Composition Analysis for DevSecOps
SCA with Jenkins
SAST with Jenkins
Github Actions for DevSecOps
DAST Automation with OWASP ZAP
Attacking Kubernetes Clusters Playground
Kubernetes Policy Management with Kyverno
Kubernetes Network Security and Service-Mesh Essentials
Kubernetes Authentication and Authorization
Kubernetes Admission Control
Kubernetes 101
Essentials of Container Monitoring
Container Supply Chain Security Essentials
Attacking and Securing Container Registry
Attacking and Defending Containers
Threat Modeling with Microsoft Threat Modeling Tool
Threat Modelling Essentials
Agile Threat Modelling

Hands-on. Defensive. Bleeding-Edge.

There's no other training platform that does all three. Except AppSecEngineer.
Get Our Newsletter
Get Started
X
FOLLOW APPSECENGINEER
CONTACT

Contact Support

help@appsecengineer.com

1603 Capitol Avenue,
Suite 413A #2898,
Cheyenne, Wyoming 82001,
United States

Copyright AppSecEngineer © 2023