<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://www.ilaria-academy.com/assets/modules/gencourses/appsec-cybersecurity-hacker/en/podcast-appsec-cybersecurity-hacker.xml" rel="self" type="application/rss+xml"/>
    <title>CyberSecurity &amp; DevSecOps Expert: Develop, PenTest, and Deploy Secure Applications</title>
    <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/</link>
    <language>en-US</language>
    <description>Become a CyberSecurity &amp; DevSecOps Specialist: Understand the risks of an application to prioritize tests and corrections; Conduct a Web/API application Pentest (recognition, tests, proofs) on an authorized perimeter; Identify and validate major vulnerabilities (auth/session, access control, access control, injections, auth/session, access control, access, injection, injection, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injections, CSRF, injection); Master the main tools such as Nmap, Wireshark, Metasploit, Python scripting; Correct flaws properly and set up non-regression tests; Produce a vulnerability report; Set up a secure delivery chain: CI/CD, SAST (Static Application Security Testing), DAST (Dynamic Application Security Testing), SCA (Software Composition Analysis), SCA (Software Composition Analysis), containers.</description>
    <copyright>© 2026 Ilaria Digital School. Tous droits réservés.</copyright>
    <category>Education</category>
    <itunes:author>Ilaria Digital School</itunes:author>
    <itunes:owner>
      <itunes:name>Ilaria Digital School</itunes:name>
      <itunes:email>courses-cybersecurity@ilaria-academy.com</itunes:email>
    </itunes:owner>
    <itunes:explicit>false</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <podcast:locked>yes</podcast:locked>
    <podcast:guid>39149f2e-39dd-5304-b60c-563396413081</podcast:guid>
    <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/image-3000x3000.jpg?v=1776439988"/>
    <item>
      <title>Welcome, objectives and chapter journey</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/a6c34abd-d2cc-4159-a376-15f1b0ce6404/welcome-objectives-and-chapter-journey</link>
      <description>Welcome to the course 'CyberSecurity and DevSecOps Expert: Develop, Pentest, and Deploy Secure Applications'. This introductory chapter is your starting point. Before diving into technical tools, attack techniques, or secure deployment pipelines, it ...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/a6c34abd-d2cc-4159-a376-15f1b0ce6404.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:a6c34abd-d2cc-4159-a376-15f1b0ce6404</guid>
      <pubDate>Tue, 24 Mar 2026 04:19:06 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_001_a6c34abd-d2cc-4159-a376-15f1b0ce6404.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Essential vocabulary: security, threat, vulnerability, risk</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/401ff9de-fe56-4301-a9f7-79df5d7e136d/essential-vocabulary-security-threat-vulnerability-risk</link>
      <description>Welcome to this first foundational lesson. Before diving into technical tools, penetration testing techniques, or secure development practices, you need to master the vocabulary that structures all of cybersecurity. These words — security, threat, vu...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/401ff9de-fe56-4301-a9f7-79df5d7e136d.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:401ff9de-fe56-4301-a9f7-79df5d7e136d</guid>
      <pubDate>Tue, 24 Mar 2026 16:18:54 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_002_401ff9de-fe56-4301-a9f7-79df5d7e136d.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: associate each term with a concrete case</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/199148a4-3b3c-4cd1-aa90-e070c5815472/workshop-associate-each-term-with-a-concrete-case</link>
      <description>**Theoretical Recap** Before diving into the workshop, let's consolidate the four core vocabulary terms you encountered in the previous lesson. A **threat** is any potential event or actor that could cause harm to a system — for example, a hacker att...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/199148a4-3b3c-4cd1-aa90-e070c5815472.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:199148a4-3b3c-4cd1-aa90-e070c5815472</guid>
      <pubDate>Wed, 25 Mar 2026 04:19:08 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_003_199148a4-3b3c-4cd1-aa90-e070c5815472.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>The CIA pillars: confidentiality, integrity, availability</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/4e94ff63-d31c-4bd7-8d49-e600ee0a2fd5/the-cia-pillars-confidentiality-integrity-availability</link>
      <description>Before diving into the technical world of cybersecurity and secure application development, every professional in this field must internalize a fundamental framework: the three pillars known as the CIA triad. These three pillars are Confidentiality, ...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/4e94ff63-d31c-4bd7-8d49-e600ee0a2fd5.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:4e94ff63-d31c-4bd7-8d49-e600ee0a2fd5</guid>
      <pubDate>Thu, 26 Mar 2026 04:20:20 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_005_4e94ff63-d31c-4bd7-8d49-e600ee0a2fd5.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: identifying the CIA pillar under threat</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/15f46b2e-1139-4bb3-97f3-581fd6a9cb77/workshop-identifying-the-cia-pillar-under-threat</link>
      <description>**Theoretical Recap** Before diving into the workshop, let's consolidate the essential framework you need. The CIA Triad is the cornerstone model of information security, composed of three pillars: Confidentiality, Integrity, and Availability. Confid...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/15f46b2e-1139-4bb3-97f3-581fd6a9cb77.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:15f46b2e-1139-4bb3-97f3-581fd6a9cb77</guid>
      <pubDate>Thu, 26 Mar 2026 16:19:13 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_006_15f46b2e-1139-4bb3-97f3-581fd6a9cb77.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: Creating your own threat examples</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/63e946e2-25de-4819-b20d-94fd23358fd1/workshop-creating-your-own-threat-examples</link>
      <description>THEORETICAL RECAP Before diving into the workshop, let's consolidate what you have covered so far. Four core concepts form the backbone of cybersecurity thinking: security (the overall state of protection of systems and data), threat (any potential e...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/63e946e2-25de-4819-b20d-94fd23358fd1.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:63e946e2-25de-4819-b20d-94fd23358fd1</guid>
      <pubDate>Fri, 27 Mar 2026 13:19:32 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_008_63e946e2-25de-4819-b20d-94fd23358fd1.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Common web threats presented simply</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/1c3b5334-1597-4b84-b4c5-ce54ab465515/common-web-threats-presented-simply</link>
      <description>In the previous activities, you built a solid foundation: you mastered the core vocabulary of cybersecurity (security, threat, vulnerability, risk), and you explored the three fundamental pillars that any security approach must protect: confidentiali...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/1c3b5334-1597-4b84-b4c5-ce54ab465515.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:1c3b5334-1597-4b84-b4c5-ce54ab465515</guid>
      <pubDate>Sat, 28 Mar 2026 05:05:32 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_009_1c3b5334-1597-4b84-b4c5-ce54ab465515.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: recognize the threat on a screenshot</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/30e94646-ead2-4248-abc9-b53624739b32/workshop-recognize-the-threat-on-a-screenshot</link>
      <description>**Theoretical Recap** Before diving into the workshop, let's consolidate what you have covered so far. In cybersecurity, a threat is any potential event or action that could exploit a vulnerability to cause harm to an information system. A vulnerabil...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/30e94646-ead2-4248-abc9-b53624739b32.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:30e94646-ead2-4248-abc9-b53624739b32</guid>
      <pubDate>Sun, 29 Mar 2026 22:55:42 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_010_30e94646-ead2-4248-abc9-b53624739b32.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Intermediate visual summary: mental map of concepts</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/b08ba306-a83b-4237-9456-c9fee2e97f09/intermediate-visual-summary-mental-map-of-concepts</link>
      <description>At this stage of your learning journey, you have covered a significant amount of foundational material. You have explored the core vocabulary of cybersecurity, discovered the three pillars known as the CIA triad, and encountered the most common web t...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/b08ba306-a83b-4237-9456-c9fee2e97f09.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:b08ba306-a83b-4237-9456-c9fee2e97f09</guid>
      <pubDate>Tue, 31 Mar 2026 03:18:56 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_012_b08ba306-a83b-4237-9456-c9fee2e97f09.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Introduction to DevOps and the DevSecOps concept</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/f6e12f6c-318c-4adc-856f-e9d128b0ccae/introduction-to-devops-and-the-devsecops-concept</link>
      <description>Before diving into the world of security within development pipelines, it is essential to understand what DevOps is, why it was created, and how the concept of DevSecOps grew out of it. You have already explored the foundational pillars of cybersecur...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/f6e12f6c-318c-4adc-856f-e9d128b0ccae.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:f6e12f6c-318c-4adc-856f-e9d128b0ccae</guid>
      <pubDate>Tue, 31 Mar 2026 12:19:00 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_013_f6e12f6c-318c-4adc-856f-e9d128b0ccae.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: visualizing a simplified CI/CD pipeline</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/b9dd1c8c-9993-48d2-ac5e-db22a8944c85/workshop-visualizing-a-simplified-ci-cd-pipeline</link>
      <description>**Theoretical Recap** CI/CD stands for Continuous Integration and Continuous Delivery (or Deployment). It is the backbone of modern DevOps — and by extension, DevSecOps — workflows. Continuous Integration means that every time a developer pushes code...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/b9dd1c8c-9993-48d2-ac5e-db22a8944c85.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:b9dd1c8c-9993-48d2-ac5e-db22a8944c85</guid>
      <pubDate>Wed, 01 Apr 2026 03:19:00 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_014_b9dd1c8c-9993-48d2-ac5e-db22a8944c85.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>The role of safety at every stage of the pipeline</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/a342804e-6af4-4570-853c-d41bc9317c2e/the-role-of-safety-at-every-stage-of-the-pipeline</link>
      <description>When we talk about a software delivery pipeline, we are referring to the full chain of automated steps that transforms source code written by developers into a running application available to end users. In a traditional DevOps approach, this chain i...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/a342804e-6af4-4570-853c-d41bc9317c2e.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:a342804e-6af4-4570-853c-d41bc9317c2e</guid>
      <pubDate>Thu, 02 Apr 2026 03:19:10 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_016_a342804e-6af4-4570-853c-d41bc9317c2e.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: placing security checks in an imaginary pipeline</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/adf4bed4-ebad-4a61-88cd-af969009f868/workshop-placing-security-checks-in-an-imaginary-pipeline</link>
      <description>THEORETICAL RECAP A CI/CD pipeline (Continuous Integration / Continuous Delivery) is the automated chain that takes source code from a developer's commit all the way to a running application in production. In a DevSecOps approach, security is not a f...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/adf4bed4-ebad-4a61-88cd-af969009f868.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:adf4bed4-ebad-4a61-88cd-af969009f868</guid>
      <pubDate>Thu, 02 Apr 2026 15:19:08 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_017_adf4bed4-ebad-4a61-88cd-af969009f868.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: Adapting a secure pipeline to an e-commerce project</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/5e7155e7-4424-4cde-a243-dcd32e5abdd0/workshop-adapting-a-secure-pipeline-to-an-e-commerce-project</link>
      <description>THEORETICAL RECAP A CI/CD pipeline (Continuous Integration / Continuous Delivery) is an automated sequence of steps that takes source code from a developer's commit all the way to a production deployment. In a standard DevOps pipeline, the typical st...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/5e7155e7-4424-4cde-a243-dcd32e5abdd0.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:5e7155e7-4424-4cde-a243-dcd32e5abdd0</guid>
      <pubDate>Fri, 03 Apr 2026 15:19:06 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_019_5e7155e7-4424-4cde-a243-dcd32e5abdd0.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Pipeline checkpoints and artifacts</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/9d053751-b409-44d9-be35-f769da62fd72/pipeline-checkpoints-and-artifacts</link>
      <description>In the previous activities, you explored what a Continuous Integration and Continuous Delivery pipeline looks like, and you practiced placing security checks at various stages of an imaginary pipeline. You also adapted a secure pipeline to an e-comme...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/9d053751-b409-44d9-be35-f769da62fd72.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:9d053751-b409-44d9-be35-f769da62fd72</guid>
      <pubDate>Mon, 06 Apr 2026 03:19:03 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_020_9d053751-b409-44d9-be35-f769da62fd72.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Storyboard: Incident avoided with DevSecOps</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/68c61b0e-9113-47b9-b7b4-b46fdd8833fc/storyboard-incident-avoided-with-devsecops</link>
      <description>Introduction: Why a storyboard approach? Throughout the previous activities, you have explored what DevSecOps means, how a Continuous Integration and Continuous Delivery pipeline works, where security checks fit in at each stage, and how artifacts an...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/68c61b0e-9113-47b9-b7b4-b46fdd8833fc.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:68c61b0e-9113-47b9-b7b4-b46fdd8833fc</guid>
      <pubDate>Mon, 06 Apr 2026 23:34:02 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_022_68c61b0e-9113-47b9-b7b4-b46fdd8833fc.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>mini-project: writing a security-oriented user story</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/898f3f38-4360-4a8f-b2a6-b9a20bd06bec/mini-project-writing-a-security-oriented-user-story</link>
      <description>## Mini-Project: Writing a Security-Oriented User Story ### Project Overview Building on your understanding of DevSecOps principles, the CI/CD pipeline, and the CIA triad, this mini-project challenges you to write a complete set of security-oriented ...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/898f3f38-4360-4a8f-b2a6-b9a20bd06bec.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:898f3f38-4360-4a8f-b2a6-b9a20bd06bec</guid>
      <pubDate>Tue, 07 Apr 2026 15:19:06 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_023_898f3f38-4360-4a8f-b2a6-b9a20bd06bec.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Entry ramp summary and personal checklist</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/abc7c514-8227-4105-ba7e-6da131ebc1a7/entry-ramp-summary-and-personal-checklist</link>
      <description>You have now completed the introductory section of this course on CyberSecurity and DevSecOps. Before moving on to more technical and specialized content, this chapter serves a double purpose: consolidating everything you have learned so far and givi...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/abc7c514-8227-4105-ba7e-6da131ebc1a7.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:abc7c514-8227-4105-ba7e-6da131ebc1a7</guid>
      <pubDate>Wed, 08 Apr 2026 15:19:21 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_025_abc7c514-8227-4105-ba7e-6da131ebc1a7.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Prepare your secure test environment (VM, accounts, browser)</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/d5505e4a-dfb7-489c-906f-2ed90042c71d/prepare-your-secure-test-environment-vm-accounts-browser</link>
      <description>Before performing any security test, penetration test, or vulnerability analysis, you must set up a dedicated, isolated, and controlled environment. This is not optional. Working directly on your personal machine, using your real accounts, or testing...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/d5505e4a-dfb7-489c-906f-2ed90042c71d.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:d5505e4a-dfb7-489c-906f-2ed90042c71d</guid>
      <pubDate>Thu, 09 Apr 2026 03:19:21 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_026_d5505e4a-dfb7-489c-906f-2ed90042c71d.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: installing and verifying the lab virtual machine</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/206e3fd8-15af-4198-857b-aeee9c52f362/workshop-installing-and-verifying-the-lab-virtual-machine</link>
      <description>**Theoretical Recap** A virtual machine (VM) is a software emulation of a physical computer. It runs an operating system and applications in an isolated environment, completely separated from your host system. This isolation is fundamental in cyberse...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/206e3fd8-15af-4198-857b-aeee9c52f362.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:206e3fd8-15af-4198-857b-aeee9c52f362</guid>
      <pubDate>Thu, 09 Apr 2026 15:19:10 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_027_206e3fd8-15af-4198-857b-aeee9c52f362.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Very high level introduction to Git as the foundation of the pipeline</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/872ac228-f8a2-4640-8acd-bfc4fa32cd8f/very-high-level-introduction-to-git-as-the-foundation-of-the-pipeline</link>
      <description>Git is a version control system. That means it is a tool that tracks every change made to a set of files over time. If you write code, modify a configuration file, or update a script, Git records what changed, when it changed, and who made the change...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/872ac228-f8a2-4640-8acd-bfc4fa32cd8f.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:872ac228-f8a2-4640-8acd-bfc4fa32cd8f</guid>
      <pubDate>Fri, 10 Apr 2026 15:19:16 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_029_872ac228-f8a2-4640-8acd-bfc4fa32cd8f.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: first Git manipulations (clone, commit)</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/228f4529-0e0f-498f-b314-f47f65e3f45e/workshop-first-git-manipulations-clone-commit</link>
      <description>THEORETICAL RECAP Git is a distributed version control system that tracks changes in files over time. Every project managed with Git lives inside a repository (repo), which stores the full history of modifications. Understanding a few core concepts i...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/228f4529-0e0f-498f-b314-f47f65e3f45e.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:228f4529-0e0f-498f-b314-f47f65e3f45e</guid>
      <pubDate>Mon, 13 Apr 2026 03:19:03 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_030_228f4529-0e0f-498f-b314-f47f65e3f45e.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Git and traceability: history at the service of security</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/ddb6a467-6c71-4fbb-b056-963e4a5c81e0/git-and-traceability-history-at-the-service-of-security</link>
      <description>Git is far more than a simple tool for saving code. When used correctly, it becomes a genuine security instrument, allowing teams to track every change, identify the origin of a vulnerability, and respond quickly to incidents. This course builds dire...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/ddb6a467-6c71-4fbb-b056-963e4a5c81e0.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:ddb6a467-6c71-4fbb-b056-963e4a5c81e0</guid>
      <pubDate>Tue, 14 Apr 2026 03:19:13 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_032_ddb6a467-6c71-4fbb-b056-963e4a5c81e0.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: simulating a committed secret and correcting it</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/794de7a1-bc45-4e64-8c68-3ff4685eddb7/workshop-simulating-a-committed-secret-and-correcting-it</link>
      <description>**Theoretical Recap** In the world of DevSecOps, one of the most common and dangerous mistakes a developer can make is accidentally committing a secret — a password, an API key, a database connection string, a private token — directly into a Git repo...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/794de7a1-bc45-4e64-8c68-3ff4685eddb7.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:794de7a1-bc45-4e64-8c68-3ff4685eddb7</guid>
      <pubDate>Tue, 14 Apr 2026 15:19:18 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_033_794de7a1-bc45-4e64-8c68-3ff4685eddb7.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Secure branch policies: key concepts</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/719a74a7-0f8c-4bfb-b36d-d0be52cb77d1/secure-branch-policies-key-concepts</link>
      <description>When you work in a team on a software project, or even alone with a professional pipeline in mind, the way you organize your branches in Git is not a trivial matter. Branches are not just a convenience for parallel development: they are a critical se...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/719a74a7-0f8c-4bfb-b36d-d0be52cb77d1.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:719a74a7-0f8c-4bfb-b36d-d0be52cb77d1</guid>
      <pubDate>Wed, 15 Apr 2026 11:21:09 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_035_719a74a7-0f8c-4bfb-b36d-d0be52cb77d1.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: setting up a basic pre-commit rule</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/b76723de-7e61-480e-b921-2ed2b0ed6c19/workshop-setting-up-a-basic-pre-commit-rule</link>
      <description>**Theoretical Recap** A pre-commit hook is a script that Git executes automatically before finalizing a commit. It acts as a last-line-of-defence gate: if the script exits with a non-zero code, the commit is rejected and the developer is forced to fi...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/b76723de-7e61-480e-b921-2ed2b0ed6c19.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:b76723de-7e61-480e-b921-2ed2b0ed6c19</guid>
      <pubDate>Thu, 16 Apr 2026 03:19:09 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_036_b76723de-7e61-480e-b921-2ed2b0ed6c19.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Printable memo sheet: minimal secure pipeline</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/f54492e7-c72f-47d8-8b1c-c9e5ddc698d8/printable-memo-sheet-minimal-secure-pipeline</link>
      <description>This memo sheet is designed to consolidate everything you have learned so far into a single, clear, and actionable reference. You have already explored Git fundamentals, branch policies, pre-commit hooks, security concepts such as Confidentiality, In...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/f54492e7-c72f-47d8-8b1c-c9e5ddc698d8.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:f54492e7-c72f-47d8-8b1c-c9e5ddc698d8</guid>
      <pubDate>Fri, 17 Apr 2026 03:19:18 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_038_f54492e7-c72f-47d8-8b1c-c9e5ddc698d8.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Overview of the OWASP Top 10</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/3ade80c9-aad8-4b65-8292-2cc7159bff7e/overview-of-the-owasp-top-10</link>
      <description>Before diving into penetration testing techniques or setting up a secure delivery pipeline, every cybersecurity practitioner must understand what they are actually protecting against. The OWASP Top 10 is the most widely recognized reference in web ap...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/3ade80c9-aad8-4b65-8292-2cc7159bff7e.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:3ade80c9-aad8-4b65-8292-2cc7159bff7e</guid>
      <pubDate>Fri, 17 Apr 2026 15:19:27 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_039_3ade80c9-aad8-4b65-8292-2cc7159bff7e.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: mapping the OWASP Top 10 on the pipeline</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/229e9463-a466-4811-9956-e466f5b8477b/workshop-mapping-the-owasp-top-10-on-the-pipeline</link>
      <description>**Theoretical Recap** The OWASP Top 10 is a regularly updated reference document listing the ten most critical web application security risks. It is not a checklist to mechanically tick off, but a risk map that helps teams prioritize where to focus t...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/229e9463-a466-4811-9956-e466f5b8477b.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:229e9463-a466-4811-9956-e466f5b8477b</guid>
      <pubDate>Mon, 20 Apr 2026 03:19:04 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_040_229e9463-a466-4811-9956-e466f5b8477b.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>The three shifts: Shift-Left, Shift-Right, Feedback Loop</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/53b3103b-baa6-4221-b8ce-29dd1af1d8c7/the-three-shifts-shift-left-shift-right-feedback-loop</link>
      <description>Security in software development has undergone a profound transformation over the past two decades. Traditionally, security was treated as a final checkpoint: developers would write code, assemble an application, and only at the very end would a secu...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/53b3103b-baa6-4221-b8ce-29dd1af1d8c7.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:53b3103b-baa6-4221-b8ce-29dd1af1d8c7</guid>
      <pubDate>Tue, 21 Apr 2026 00:19:16 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_042_53b3103b-baa6-4221-b8ce-29dd1af1d8c7.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: placing security tests into an existing workflow</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/636047de-9139-4239-bbdd-4ab168670a0a/workshop-placing-security-tests-into-an-existing-workflow</link>
      <description>**Theoretical Recap** Integrating security tests into an existing CI/CD workflow is the operational heart of DevSecOps. The core principle is simple: security checks must not be an afterthought bolted onto the end of a pipeline — they must be embedde...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/636047de-9139-4239-bbdd-4ab168670a0a.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:636047de-9139-4239-bbdd-4ab168670a0a</guid>
      <pubDate>Tue, 21 Apr 2026 15:19:27 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_043_636047de-9139-4239-bbdd-4ab168670a0a.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Mini-project: create a YAML mini-pipeline with commented security steps</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/ce1220ec-2d18-4a02-8e9a-6c017fd600a7/mini-project-create-a-yaml-mini-pipeline-with-commented-security-steps</link>
      <description>## Project Overview This mini-project is the capstone activity of the INTRO chapter. Having covered Git security policies, pre-commit hooks, OWASP Top 10, CIA triad, Shift-Left/Shift-Right/Feedback Loop principles, and pipeline security mapping, you ...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/ce1220ec-2d18-4a02-8e9a-6c017fd600a7.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:ce1220ec-2d18-4a02-8e9a-6c017fd600a7</guid>
      <pubDate>Wed, 22 Apr 2026 03:19:12 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_044_ce1220ec-2d18-4a02-8e9a-6c017fd600a7.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Step-by-Step Guide: Pre-commit Checklist</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/47a27573-05be-4895-be42-b933e05ca4ed/step-by-step-guide-pre-commit-checklist</link>
      <description>A pre-commit checklist is a structured list of security and quality checks that every developer must run — or that are automatically triggered — before any piece of code is officially committed to a shared version control repository such as Git. The ...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/47a27573-05be-4895-be42-b933e05ca4ed.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:47a27573-05be-4895-be42-b933e05ca4ed</guid>
      <pubDate>Thu, 23 Apr 2026 03:19:03 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_046_47a27573-05be-4895-be42-b933e05ca4ed.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Reading a fictional vulnerability report: structure and terminology</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/a7514ffe-19ab-426a-9381-dbee4ee9aa8f/reading-a-fictional-vulnerability-report-structure-and-terminology</link>
      <description>Understanding how to read a vulnerability report is a foundational skill for anyone entering the field of cybersecurity or DevSecOps. Whether you are reviewing a report produced by a penetration tester, an automated scanning tool, or a security team,...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/a7514ffe-19ab-426a-9381-dbee4ee9aa8f.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:a7514ffe-19ab-426a-9381-dbee4ee9aa8f</guid>
      <pubDate>Thu, 23 Apr 2026 15:19:03 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_047_a7514ffe-19ab-426a-9381-dbee4ee9aa8f.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
    <item>
      <title>Workshop: extracting key information from the report</title>
      <link>https://www.ilaria-academy.com/nextjob/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/930516c4-8844-4830-bea4-8dfee3abcdc8/workshop-extracting-key-information-from-the-report</link>
      <description>**Theoretical Recap** A vulnerability report is a structured document that communicates security findings to both technical and non-technical stakeholders. Understanding how to read and extract key information from such a report is a foundational ski...</description>
      <itunes:author>Ilaria Digital School</itunes:author>
      <itunes:image href="https://d1rnac2mfuys5x.cloudfront.net/featuredImgs/appsec-cybersecurity-hacker/en/9adaf497-120b-4302-bb66-548483ef7fcc/930516c4-8844-4830-bea4-8dfee3abcdc8.webp?v=1776439988"/>
      <itunes:explicit>false</itunes:explicit>
      <guid isPermaLink="false">nextjob:appsec-cybersecurity-hacker:930516c4-8844-4830-bea4-8dfee3abcdc8</guid>
      <pubDate>Fri, 24 Apr 2026 03:19:17 +0000</pubDate>
      <enclosure url="https://d2npv62flruwzz.cloudfront.net/chapter-audio/form_data_appsec-cybersecurity-hacker-en-v001_20260306_214311_4c6ca22d-4a0a-4cf7-8929-7a052b329143/9adaf497-120b-4302-bb66-548483ef7fcc/chapter_048_930516c4-8844-4830-bea4-8dfee3abcdc8.mp3" length="10485760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:duration>00:15:00</itunes:duration>
    </item>
  </channel>
</rss>
