Security Journey Green Belts

Language & Technology Focused AppSec Training & Hands-On Experiments

14
Learning Modules
Brown Belt Points
14
Number of Green Belts
200
:
Hours of Content
Number of Modules
59
Lessons with Experiments
Black Belt Points

What Languages Do You Speak?

Our Green Belts train developers to infuse security into their everyday development environments. From C/C++, Java, C#, Cloud Security, API, Containerization and much more, these belts apply the core principles, vocabulary, tools and concepts to specific code languages while offering hands-on experiments the implement what is learned.

Ready to give us a test drive? Sign Up here.

Here's what's included in the
Green Belt
path.
Intro to Secure Development
Intro to Secure Coding
Secure Coding Best Practices: Part 1
Secure Coding Best Practices: Part 2
Language Typing
Securing the Development Environment
Protecting your Code Repository
Producing a Clean, Maintainable, & Secure Code Culture
Secure the Release
Designing a Secure App or Product
Thinking Like A Penetration Tester
Secure Design Principles in Action: Part 1
Secure Design Principles in Action: Part 2
Syntactic & Semantic Input Validation 
Input Validation with Range Checks, Regex, & Enums​
Web Input Validation: MVC
Web Input Validation: MVC client-side
Web Input Validation: Webforms and Webpages
Parameterization with SQL
Securely Working with SQL
Safely Working with XML
Avoiding Insecure Serialization & Deserialization
Encode Output
Authentication: Basic and Windows
Authentication: Forms
Authentication: Token
Authentication: JWT
Authentication: External authentication
Authentication: .NET Core Identity
CSRF & Open Redirects
Authorization: Simple, Role-Based, & View-Based
Authorization: Claims & Policy
Authorization: Legacy
Sessions and Cookies
Logging
Error Handling and Exceptions
HTTPS and TLS
Content Security Policy
Security Headers
Data Protection API
Hashing Passwords
File Uploads
Thread Safety
Application Secrets Storage
Insecure Coding with C#
Introduction and Specifications
Classes of Vulnerabilities, Part 1
Classes of Vulnerabilities, Part 2
Classes of Vulnerabilities, Part 3
Anatomy of a Stack Buffer Overflow Exploit
Platform Mitigations
Undefined Behavior & Compiler Optimizations
Exploitable Programming Constructs with Memory: Part 1
Exploitable Programming Constructs with Memory: Part 2
Exploitable Programming Constructs with Numbers
Secure Programming Practices: Part 1
Secure Programming Practices: Part 2
Secure Programming Practices: Part 3
Secure Programming Practices: Part 4
Insecure Coding: Part 1
Insecure Coding, Part 2
Insecure Coding, Part 3
WarGames
Introduction to Python Security
Python Threat Landscape
Secure Code Constructs in Python
Secure Coding with Python I
Secure Coding with Python II
Secure Coding with Python III
Input Validation with Python
Secure Serialization with Python
Secure OS Interactions​ with Python
Storing and Using Secrets with Python​
Python Toolchain
Django Best Practices I
Django Best Practices II
Secure Control Flow in Python
Intro to Ruby Security
Ruby Threat Landscape
Secure Software Supply Chain
Secure Coding with Ruby | Part 2​
Input Validation with Ruby
Secure Coding with Ruby | Part 1​
Secure Coding with Ruby | Part 3
Building a Secure Rails Application
Ruby OWASP Top 10 | Part 1
Ruby OWASP Top 10 | Part 2​
Ruby OWASP Top 10 | Part 3
Static Code Analysis
API: Threat Landscape 
API: Security Top Ten, Part 1
API: Security Top Ten, Part 2
API: Security Top Ten, Part 3
API: Secure Design 
API: Authentication & Authorization
API: Security Best Practices, Part 1 
API: Security Best Practices, Part 2 
Intro to R security
The R Threat Landscape
Secure Coding with R | Part 1
Here's what's included in the
Green Belt
path.
Check Out All Our Green Belt Paths

Ready to give us a test drive? Sign Up here.

Ready to start your journey?

Try It For Free