learn.snyk.io Open in urlscan Pro
2a02:26f0:2100:2ab::ecd  Public Scan

URL: https://learn.snyk.io/learning-paths/security-for-developers/
Submission: On December 12 via manual from GB — Scanned from GB

Form analysis 2 forms found in the DOM

<form id="mktoForm_1461" style="display: none; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1px;" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
      color: #fff;
      border: 1px solid #75ae4c;
      padding: 0.4em 1em;
      font-size: 1em;
      background-color: #99c47c;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
      background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
      background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
      background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
      border: 1px solid #447f19;
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
      outline: none;
      border: 1px solid #447f19;
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
      background-color: #75ae4c;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
      background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
      background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
      background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
    }
  </style>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple" style="margin-left: 120px;"><button type="submit" class="mktoButton">Submit</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="1461"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="677-THP-415">
</form>

<form style="display: none; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" novalidate="novalidate"
  class="mktoForm mktoHasWidth mktoLayoutLeft"></form>

Text Content

This website uses cookies to ensure you get the best experience on our website.
Learn more
Got it!
We're sorry but Snyk Learn doesn't work properly without JavaScript enabled.
Please enable it to continue.
Learn

   
 * Browse topics
   
   
   


LoginSign up
Learn
   
 * Browse topics
   By type
      
    * Security education
    * Product training
      
   
   By format
      
    * Lesson
    * Learning path
      
   
   View all
   
   

LoginSign up
    
 1. Snyk Learn /
 2. Learning paths /
 3. Security for developers
    


SECURITY FOR DEVELOPERS

Snyk and New York University, Tandon School of Engineering are partnering
together to offer and curate Snyk Learn lessons for an NYU Cybersecurity
Industry Partner badge: Security for Developers.

Snyk Learn offers NYU Tandon students a unique opportunity to enhance their
security skills. With the increasing demand for secure applications and systems,
developer security knowledge is more important than ever. By completing the
Security for Developers Learning Path, NYU Tandon students can earn a
certificate from Snyk and an Industry badge from NYU Tandon, setting them apart
in the competitive job market.

Everyone is welcome to complete the Security for Developers Learning Path and
download their certificate; however, only NYU Tandon students will receive the
industry badge. To learn more about the badge, please visit NYU Tandon
Cybersecurity Industry Partner Badges.

Security for developers

Sign up to track your progress!
Sign up for free


SAVE YOUR LEARNING PROGRESS.

 * Track your learning progress
 * Keep up to date with the latest vulnerabilities
 * Scan your application code to stay secure

Sign up for free


LESSONS

The following lessons are required to complete to earn your certificate of
completion! Learn about broken access control, various injection attacks, and
more!


Broken access control

Insecure hash

Insecure Randomness

Cross-site scripting (XSS)

Code injection

Cross site request forgery (CSRF)

Prototype pollution

NoSQL injection attack

SQL injection (SQLi)

XML external entity injection (XXE)

XPath injection

Insecure design

Vulnerable and outdated components

Directory traversal

Logging vulnerabilities

Server-side request forgery (SSRF)
Book a demoSign up for free

--------------------------------------------------------------------------------


PRODUCT

   
 * Snyk Open Source
 * Snyk Code
 * Snyk Container
 * Snyk Infrastructure as Code
 * ASPM Solution
 * Application Security Solution
 * Supply Chain Security Solution
 * Deepcode AI
   


RESOURCES

   
 * Vulnerability DB
 * Snyk OSS Advisor
 * Documentation
 * Disclosed Vulnerabilities
 * FAQs
 * Code Checker
 * Audit Services
   


COMPANY

   
 * About us
 * Snyk Impact
 * Customers
 * Jobs at Snyk
 * Policies
 * Do Not Sell My Personal Information
   


CONNECT

   
 * Blog
 * Security Fundamentals
 * Security Series
 * Support
 * Press Kit
 * Events
 * Report a new vuln
   


TOPICS

   
 * Security Education
 * Product Training
 * Learning Paths
   

 * Snyk is an open source security platform designed to help software-driven
   businesses enhance developer security. Snyk's dependency scanner makes it the
   only solution that seamlessly and proactively finds, prioritizes and fixes
   vulnerabilities and license violations in open source dependencies and
   container images.


TRACK OUR DEVELOPMENT

   
 * 
 * 
 * 
 * 
 * 
 * 
 * 
   

© 2023 Snyk Limited
Registered in England and Wales | Company number: 09677925
Registered address: Highlands House, Basingstoke Road, Spencers Wood, Reading,
Berkshire, RG7 1NT.



Submit