Startup Security Handbook
Things Every Employee Should Know
Working with Clients
How we bill
Talking with clients
Setting proactive boundaries
Git, GitHub, and Version Control
Basics of Git
GitHub Workflow
Branching Strategies
SSO, OAuth, and Modern IAM
SSO Explained
OAuth 2.0 Overview
IAM Best Practices
OWASP Top 10 & Modern Vuln Lingo
OWASP Top 10 Overview
Common Vulnerabilities
Security Terminology
Secure Coding Practices
Introduction to Secure Coding
Common Coding Vulnerabilities
Best Practices
Incident Response
Incident Response Overview
Steps in Incident Response
Tools and Techniques
Data Privacy
Data Privacy Basics
GDPR Overview
Data Protection Strategies
Common Tools
Nmap
Nuclei
Wireshark
Burp Suite
Just Enough Crypto
Introduction to Cryptocurrency
Bitcoin Basics
Ethereum Overview
Cryptocurrency Wallets
< Back to Home