🔥 Subscribe to Our Monthly Security Digest Newsletter
MEDIA
Connected cars communication protocols, secure update, privacy, access control, and encryption requirements.
.NET 6
C/C++ (POSIX and Microsoft)
Hardware, firmware, and embedded device controls
Hardware problems based on CWE 4.13 weaknesses
ASD-STIG 5
ASVS 4.0
CWE TOP 25, 2023
CWE 4.13
CWE/SANS Top 25, 2020
CVSS 3
MDS2-2013
OWASP Top 10 2017
OWASP API Top 10, 2019
NIST 800-53r4 (Granular Mandates)
NIST 800-53r5
NIST 800-82 Industrial Control Systems
NIST 800-95 Web Services
NIST 800-147/800-155 BIOS/FW
NIST 800-171 Non Federal Systems
U.S. Federal Government: Control Correlation Identifier (CCI)
Authentication and Access Control
Bluetooth
Communication Protocols: MQTT, XMPP, AMQP, Thread, HyperCat, ZigBee, Pub/Sub
Availability and Systems DoS Protection
RFID Solutions
WiFi
Consumer IoT: ETSI EN 303 645
CCPA for Software Development
Continuous Compliance
Defending .NET
Defending AI
Defending Angular
Defending Ansible
Defending AWS
Defending Azure
Defending Android
Defending ASP.NET Core in C#
Defending C
Defending COBOL
Defending Containers
Cloud Security Fundamentals
CSSPL Suite
Defending Databases
Defending Django
Defending Docker
Defending G
Defending HTML5
Defending iOS
Defending JavaScript
Defending JSP
Defedning Kubernetes
Defending Node.js
Defending PHP
Defending Python
Defending React
Defending Rust
Defending Terraform
Defending TypeScript
Defending Web APIs
Defending Web Apps
DevSecOps for Managers
DevSecOps Fundamentals
GDPR for Developers
HIPAA Privacy and Security
Microservices
Mobile Security Fundamentals
OAuth Security Fundamentals
OpSec Fundamentals
OWASP Top 10 2021
PCI-DSS Compliance
PCI SSF Compliance
PCI Secure Software Lifecycle
Privacy Fundamentals
COBOL
Secure Development Guidelines
Android Framework (Java and Kotlin)
Flutter / Dart
iOS Framework (Objective-C and Swift)
OWASP Mobile ASVS
Amazon Web Services (AWS)
Apache HTTP Server
Apache Tomcat Server
AWS API Gateway
AWS Cognito
AWS Kinesis Data Firehose and Data Streams
AWS Lambda
AWS WAF
AWS SQS and AWS RDS
Azure AKS
Docker
Google Cloud Platform
Infrastructure as Code (IaC): Ansible
Kubernetes
Microservices Infrastructure
Microsoft Azure
Microsoft IIS Server
Microsoft SQL Server
MySQL
OpenShift
Oracle database
Privacy Related:
Apex for Force.com
C#, Visual Basic.NET, ASP.NET
GoLang
C/C++
COBOL
HTML5 and CSP
Java SE / EE
Java Libraries and Frameworks: (ESAPI, Struts, Spring, Apache Wicket, Hibernate)
JavaScript (Angular, React, Node)
JSP, Servlets
PHP
Python (Django)
Ruby on Rails
Rust
GraphQL
TypeScript
OAuth and OIDC
SOAP & REST APIs
XML & YAML Security
Connected cars communication protocols, secure update, privacy, access control, and encryption requirements.
.NET 6
C/C++ (POSIX and Microsoft)
Hardware, firmware, and embedded device controls
Hardware problems based on CWE 4.13 weaknesses
ASD-STIG 5
ASVS 4.0
CWE TOP 25, 2023
CWE 4.13
CWE/SANS Top 25, 2020
CVSS 3
Industrial Controls Systems 62443-4-1
MDS2-2013
OWASP Top 10 2017
OWASP API Top 10, 2019
NIST 800-53r4 (Granular Mandates)
NIST 800-53r5
NIST 800-82 Industrial Control Systems
NIST 800-95 Web Services
NIST 800-147/800-155 BIOS/FW
NIST 800-171 Non Federal Systems
U.S. Federal Government: Control Correlation Identifier (CCI)
Authentication and Access Control
Bluetooth
Communication Protocols: MQTT, XMPP, AMQP, Thread, HyperCat, ZigBee, Pub/Sub
Availability and Systems DoS Protection
RFID Solutions
WiFi
Consumer IoT: ETSI EN 303 645
CCPA for Software Development
Continuous Compliance
Defending .NET
Defending AI
Defending Angular
Defending Ansible
Defending AWS
Defending Azure
Defending Android
Defending ASP.NET Core in C#
Defending C
Defending COBOL
Defending Containers
Cloud Security Fundamentals
CSSPL Suite
Defending Databases
Defending Django
Defending Docker
Defending G
Defending HTML5
Defending iOS
Defending JavaScript
Defending JSP
Defedning Kubernetes
Defending Node.js
Defending PHP
Defending Python
Defending React
Defending Rust
Defending Terraform
Defending TypeScript
Defending Web APIs
Defending Web Apps
DevSecOps for Managers
DevSecOps Fundamentals
GDPR for Developers
HIPAA Privacy and Security
Microservices
Mobile Security Fundamentals
OAuth Security Fundamentals
OpSec Fundamentals
OWASP Top 10 2021
PCI-DSS Compliance
PCI SSF Compliance
PCI Secure Software Lifecycle
Privacy Fundamentals
COBOL
Secure Development Guidelines
Android Framework (Java and Kotlin)
Flutter / Dart
iOS Framework (Objective-C and Swift)
OWASP Mobile ASVS
Amazon Web Services (AWS)
Apache HTTP Server
Apache Tomcat Server
AWS API Gateway
AWS Cognito
AWS Kinesis Data Firehose and Data Streams
AWS LakeFormation
AWS Lambda
AWS WAF
AWS SQS and AWS RDS
Azure AKS
Azure Data Lake Storage
Docker
Google Cloud Platform
Infrastructure as Code (IaC): Ansible
Kubernetes
Microservices Infrastructure
Microsoft Azure
Microsoft IIS Server
Microsoft SQL Server
MySQL
OpenShift
Oracle database
Privacy Related:
Apex for Force.com
C#, Visual Basic.NET, ASP.NET
GitHub
GoLang
C/C++
COBOL
HTML5 and CSP
Java SE / EE
Java Libraries and Frameworks: (ESAPI, Struts, Spring, Apache Wicket, Hibernate)
JavaScript (Angular, React, Node)
JSP, Servlets
PHP
Python (Django)
Ruby on Rails
Rust
GraphQL
TypeScript
OAuth and OIDC
SOAP & REST APIs
XML & YAML Security
Product Security Governance, Architecture & Risk Management,
Johnson Controls
Director of Cyber & Information Security, FINRA
Vice President and CISO,
Cubic
The content library covers various categories, including:
• Artificial Intelligence
• Automotive Security
• Client & Desktop Applications
• Hardware Security
• Internet of Things (IoT)
• Just-In-Time Developer Training
• Mainframe Applications
• Mobile Applications
• Operating System Security
• Regulatory and Compliance
• Web Applications
The library offers several key benefits:
• Instant Access: On-demand access to a vast collection of security resources.
• Always Up-to-Date: Continuous updates to reflect current best practices and regulations.
• Breadth & Depth: A wide range of topics covering various security aspects.
• Expert-Authored: Content created and maintained by industry-leading security professionals.
Set up a meeting with one of our security experts to see a demo of SD Elements