Lighthouse Data Governance Consulting
Lighthouse Data Governance Consulting
  • Home
  • Our Partners
  • Resources
    • Secure Development
  • Contact Us
  • More
    • Home
    • Our Partners
    • Resources
      • Secure Development
    • Contact Us
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Our Partners
  • Resources
    • Secure Development
  • Contact Us

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

Secure Development

OWASP Cheat Sheet Series

Input Validation

Session Management

Input Validation

Input validation is critical for any application. Learn how to implement clear, simple, actionable guidance for providing Input Validation security functionality in your applications.

Learn More

Authentication

Session Management

Input Validation

Authentication is the process of verifying that an individual, entity, or website is who or what it claims to be by determining the validity of one or more authenticators (like passwords, fingerprints, or security tokens) used to back up this claim.

Learn More

Session Management

Session Management

Session Management

Session management deals with session creation, session maintenance and session termination. Security is critical for preventing unauthorized access and attacks like session hijacking.

Learn More

OWASP Resources

Developer Guide

Application Security Verification Standard (ASVS)

Application Security Verification Standard (ASVS)

A Guide to Building Secure Web Applications and Web Services - introduction to security concepts and a handy reference for application / system developers.

Learn More

Application Security Verification Standard (ASVS)

Application Security Verification Standard (ASVS)

Application Security Verification Standard (ASVS)

The OWASP Application Security Verification Standard (ASVS) Project is a framework of security requirements that focus on defining the security controls required when designing, developing and testing modern web applications and web services.

Learn More

Tools

Malware Detection

Malware Detection

Malware Detection

Assemblyline is a malware detection and analysis tool developed by the Canadian Centre for Cyber Security and released to the cyber security community in October 2017. This tool is not a replacement for desktop anti-malware or anti-virus solutions. 

Learn More

OWASP Defect Dojo

Malware Detection

Malware Detection

OWASP DefectDojo is a DevSecOps tool for vulnerability management. It provides one platform to orchestrate end-to-end security testing, vulnerability tracking, deduplication, remediation, and reporting.


One platform to orchestrate end-to-end security testing, vulnerability tracking, deduplication, remediation, and reporting.

Learn More

Security Training

Semgrep Acadmey

Incident Response for Developers

Incident Response for Developers

Semgrep Academy provides free security training from the folks at Semgrep, including training on secure application development and incident response. How awesome is that? 

Learn More

Incident Response for Developers

Incident Response for Developers

Incident Response for Developers

This course teaches software developers (and the rest of IT) what incident responders need them to know during a security incident. Covers the concept of ‘need to know’, 'see something, say something', etc.

Learn More

API Security Mini Course

Incident Response for Developers

API Security Mini Course

Learn the basics of API security in this short and fun mini course provided for free by Semgrep Academy. 

Learn More

Secure Coding

Application Security Foundations

API Security Mini Course

Learn the basics of secure coding, the OWASP Top Ten 2017, and a secure SDLC in this free, on-demand course from Semgrep Academy!

Learn More

Application Security Foundations

Application Security Foundations

Application Security Foundations

Learn how to build an application security program from the very beginning! This training is divided into Level 1, Level 2 and Level 3, each building upon the previous.

Learn More

Copyright © 2024 Lighthouse Data Consulting Inc. - All Rights Reserved.

  • Home
  • Our Partners
  • Secure Development
  • Privacy Notice
  • Code of Conduct
  • Contact Us

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept