John Prathab

Application Software Security Specialist, L Brands

John Prathab has a master's degree in software engineering and more than a decade of experience in IT, with 12 years in application security and three years in software development.

His primary responsibilities are in Secure SDLC, including but not limited to threat modeling, secure DevOps, web application firewalls, static and dynamic application security testing, RASP, pentesting and red teaming in order to safeguard information and hold people accountable for security. He's interested in active learning, innovation and mentorship and is certified in ethical hacking, computer hacking and forensic investigation. He holds SANS GMOB and Data Virtualization Architect certificates.

Content from John Prathab

Secure Software Development Life Cycle (SDLC)
Learning Path
Secure Software Development Life Cycle (SDLC)

Secure Software Development Life Cycle (SDLC)

The Secure SDLC learning path is a step-by-step approach to integrate the security controls into your software or system development life cycle. You will learn how to use each phase to develop or establish both proactive and reactive security controls across your organization. You can also learn about various tools, techniques and best practices to achieve your organizational goals.

Introduction to SDLC
Course
Introduction to SDLC

Introduction to SDLC

In this course, you'll be introduced to Secure SDLC, a framework to establish system development by integrating security.

Security Awareness Training
Course
Security Awareness Training

Security Awareness Training

Security awareness training is an education process that teaches employees and users about cybersecurity, IT best practices and even regulatory compliance.

Secure Requirements
Course
Secure Requirements

Secure Requirements

Secure requirements are security features required by system users or a quality the system must have to increase the user's trust.

Secure Design
Course
Secure Design

Secure Design

Secure design applies to individual features that can correspond to their respective secure requirements.

Secure Build
Course
Secure Build

Secure Build

Secure build is a practice to apply the secure requirements and design to the software or system development.

Secure Deploy
Course
Secure Deploy

Secure Deploy

Secure deploy is for the purpose of formalizing and automating the deployment process in a secure way.

Secure Validation
Course
Secure Validation

Secure Validation

Secure validation is testing with a hacker's perspective to check whether the security controls are in place.

Secure Response
Course
Secure Response

Secure Response

Secure response is a structured methodology for handling security incidents, breaches and cyber threats.

Collaborative Model
Course
Collaborative Model

Collaborative Model

Collaboration is an approach that applies to a wide variety of systems.

Exceptional learning experiences powered by LX Labs cyber expertise

Infosec Skills courses and labs are powered by LX Labs — our elite team of cyber SMEs, learning specialists and community of top-ranked security instructors, published authors and sought-after industry leaders. We rigorously vet all Infosec Skills training resources to guarantee they meet certification and compliance requirements and align with recognized guidelines like the NICE Cybersecurity Workforce Framework.