We may earn an affiliate commission when you visit our partners.
Course image
CodeMash
Join Angela Pinney, software architect, in this conference session to discuss the challenges with adopting a security mindset on a product team, what steps you can take to empower your team members to own security of their own applications, and how you can...
Read more
Join Angela Pinney, software architect, in this conference session to discuss the challenges with adopting a security mindset on a product team, what steps you can take to empower your team members to own security of their own applications, and how you can leverage shift-left and modern CI principles to sustain it. You will leave this session prepared to champion security on your own team and to grow a security mindset in others.
Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops in-house security expertise by growing security mindset in team members
Examines how to make shift-left a sustainable security strategy
Relevant to product teams seeking to strengthen security posture

Save this course

Save Threat Modeling on the Family Road Trip: CodeMash to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Threat Modeling on the Family Road Trip: CodeMash. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Threat Modeling on the Family Road Trip: CodeMash will develop knowledge and skills that may be useful to these careers:
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for the overall security of an organization's computer systems and networks.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security measures to protect an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction.
Security Engineer
Security Engineers design, implement, and maintain security measures to protect an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction.
Information Security Analyst
Information Security Analysts assess the security of an organization's computer systems and networks and develop and implement security measures to protect them from unauthorized access, use, disclosure, disruption, modification, or destruction.
Security Analyst
Security Analysts monitor and analyze security logs and data to identify potential threats and vulnerabilities. This course may be useful for someone who wishes to become a Security Analyst by teaching them about security mindset and how to grow a security mindset in others.
Cyber Threat Intelligence Analyst
Cyber Threat Intelligence Analysts research and analyze cyber threats and provide guidance to organizations on how to protect themselves from them.
IT Security Manager
IT Security Managers are responsible for the day-to-day security of an organization's computer systems and networks.
Security Auditor
Security Auditors assess the security of an organization's computer systems and networks and develop and implement security measures to protect them from unauthorized access, use, disclosure, disruption, modification, or destruction.
Software Architect
Software Architects design, plan, and oversee the construction of complex software systems. This course may be useful for someone who wishes to become a Software Architect by teaching them about security mindset in product teams and how to empower team members to own the security of their own applications.
Compliance Manager
Compliance Managers ensure that an organization complies with applicable laws and regulations.
Digital Forensics Analyst
Digital Forensics Analysts investigate computer crimes and recover evidence from digital devices.
Penetration Tester
Penetration Testers identify vulnerabilities in an organization's computer systems and networks by simulating attacks from external threats.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course may be useful for someone who wishes to become a Security Consultant by teaching them about security mindset in product teams and how to empower team members to own the security of their own applications.
Risk Manager
Risk Managers identify, assess, and mitigate risks to an organization's assets.
Incident Responder
Incident Responders investigate and respond to security incidents.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Threat Modeling on the Family Road Trip: CodeMash.
Provides a comprehensive overview of threat modeling, a systematic process for identifying and mitigating security risks. It is particularly valuable for readers who want to gain a deep understanding of the concepts and techniques of threat modeling.
Provides a practical guide to software security assessment. It covers a variety of techniques for identifying and preventing software vulnerabilities.
Provides a comprehensive overview of cloud security. It valuable resource for readers who want to learn about the latest cloud security threats and how to protect against them.
Provides a comprehensive overview of secure coding. It valuable resource for readers who want to learn about the latest secure coding practices.
Provides a comprehensive overview of network security with OpenSSL. It valuable resource for readers who want to learn about the latest network security threats and how to protect against them.
Provides a comprehensive overview of web application hacking. It valuable resource for readers who want to learn about the latest web application security threats and how to protect against them.
Provides a comprehensive overview of Metasploit. It valuable resource for readers who want to learn about the latest Metasploit techniques.
Provides a comprehensive overview of Kali Linux. It valuable resource for readers who want to learn about the latest Kali Linux techniques.
Provides a comprehensive overview of penetration testing. It valuable resource for readers who want to learn about the latest penetration testing techniques.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser