• Close
  • Training
    • Overview
    • Blended Learning
    • CMD+CTRL Cyber Range
      • Cyber Range Overview
      • Cyber Range Features
      • Cyber Range Reporting
      • Cyber Range Suite
      • Get a Demo
    • CMD+CTRL Security Courses
      • Courses Overview
      • Course Features
      • Learning Paths
      • Course Previews
      • Security Training Course Catalog
  • Services
    • Overview
    • Software Penetration Testing
      • Pen testing Overview
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Who We Help
    • Overview
    • Development/IT Teams
    • Security Teams
    • Enterprise Information Risk Management Teams
    • Leadership Teams
  • Resources
    • All Resources
    • Guides & Videos
    • Webinars
  • Blog
  • About
    • Company Overview
    • Centers of Excellence
    • Community
    • Accolades
    • Clients
    • Leadership Team
    • News/Events
    • Careers
    • Contact Us
  • Let’s Talk
  •  
Security Innovation
  • Training
    • Overview
    • Blended Learning
    • CMD+CTRL Cyber Range
      • Cyber Range Overview
      • Cyber Range Features
      • Cyber Range Reporting
      • Cyber Range Suite
      • Get a Demo
    • CMD+CTRL Security Courses
      • Courses Overview
      • Course Features
      • Learning Paths
      • Course Previews
      • Security Training Course Catalog
  • Services
    • Overview
    • Software Penetration Testing
      • Pen testing Overview
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Who We Help
    • Overview
    • Development/IT Teams
    • Security Teams
    • Enterprise Information Risk Management Teams
    • Leadership Teams
  • Resources
    • All Resources
    • Guides & Videos
    • Webinars
  • Blog
  • About
    • Company Overview
    • Centers of Excellence
    • Community
    • Accolades
    • Clients
    • Leadership Team
    • News/Events
    • Careers
    • Contact Us
  • Let’s Talk
  •  

Course Catalog / Subject / Platform

Platform

The Courses

View All Courses     Download Course Catalog

DSO 254 – DevSecOps in the Azure Cloud (Coming Soon)


20 Minutes
Advanced

DSO 253 – DevSecOps in the AWS Cloud (Coming Soon)


20 Minutes
Advanced

DES 216 – Protecting Cloud Infrastructure (New)


40 Minutes
Advanced

COD 258 – Creating Secure PHP Web Applications (NEW)


30 Minutes
Advanced

COD 251 – Defending AJAX-Enabled Web Applications (NEW)


25 Minutes
Advanced

COD 383 – Protecting Java Backend Services (New)


30 Minutes
Elite

COD 267 – Securing Python Microservices (New)


30 Minutes
Advanced

COD 309 – Securing ASP.NET MVC Applications (New)


30 Minutes
Advanced

COD 308 – Common ASP.NET MVC Vulnerabilities and Attacks (New)


45 Minutes
Advanced

DES 218 – Protecting Microservices, Containers, and Orchestration (New)


30 Minutes
Advanced

DES 214 – Securing Infrastructure Architecture (NEW)


30 Minutes
Advanced

DES 215 – Defending Infrastructure (NEW)


30 Minutes
Advanced

ENG 150 – Meeting Confidentiality, Integrity, and Availability (NEW)


30 Minutes

COD 284 – Secure Java Coding (NEW)


30 Minutes
Advanced

COD 266 – Secure Ruby Scripting (NEW)


15 Minutes
Advanced

COD 265 – Secure Python Scripting (NEW)


15 Minutes
Advanced

COD 249 – PCI DSS 11: Regularly Test Security Systems and Processes (NEW)


15 Minutes
Advanced

COD 248 – PCI DSS 6: Develop and Maintain Secure Systems and Applications (NEW)


15 Minutes
Advanced

COD 247 – PCI DSS 4: Encrypting Transmission of Cardholder Data (NEW)


15 Minutes
Advanced

COD 246 – PCI DSS 3: Protecting Stored Cardholder Data (NEW)


15 Minutes
Advanced

Protecting Sensitive Data while Scripting


30 Minutes
Advanced

TST 252 – Testing for OS Command Injection (CWE-78)


15 Minutes
Advanced

TST 231 – Testing for OWASP 2017: Insufficient Logging & Monitoring


10 Minutes
Advanced

TST 230 – Testing for OWASP 2017: Use of Components with Known Vulnerabilities


10 Minutes
Advanced

TST 229 – Testing for OWASP 2017: Insecure Deserialization


10 Minutes
Advanced

TST 228 – Testing for OWASP 2017: Cross Site Scripting (XSS)


15 Minutes
Advanced

TST 227 – Testing for OWASP 2017: Security Misconfiguration


10 Minutes
Advanced

TST 226 – Testing for OWASP 2017: Broken Access Control


10 Minutes
Advanced

TST 225 – Testing for OWASP 2017: XML External Entities


10 Minutes
Advanced

TST 224 – Testing for OWASP 2017: Sensitive Data Exposure


12 Minutes
Advanced

TST 223 – Testing for OWASP 2017: Broken Authentication


12 Minutes
Advanced

TST 222 – Testing for OWASP 2017: Injection


15 Minutes
Advanced

ENG 195 – Implementing the Microsoft SDL Threat Modeling Tool


20 Minutes
Elite

ENG 194 – Implementing Microsoft SDL Line of Business


20 Minutes
Elite

ENG 193 – Implementing the Microsoft SDL Optimization Model


12 Minutes
Elite

ENG 192- Implementing the Agile Microsoft SDL


20 Minutes
Elite

ENG 191 – Introduction to the Microsoft SDL


25 Minutes
Elite

ENG 121 – Essential Identification & Authentication


15 Minutes
Core

ENG 119 – Essential Security Audit & Accountability


15 Minutes
Core

ENG 115 – Essential System & Information Integrity


15 Minutes
Core

ENG 114 – Essential Risk Assessment


15 Minutes
Core

ENG 112 – Essential Access Control for Mobile Devices


15 Minutes
Core

ENG 110 – Essential Account Management Securitiy


15 Minutes
Core

DES 352 – Creating Secure Over the Air (OTA) Updates


90 Minutes
Advanced

DES 260 – Fundamentals of IoT Architecture & Design


30 Minutes
Advanced

DES 231 – Applying OWASP 2017: Mitigating Insufficient Logging & Monitoring Vulnerabilities


12 Minutes
Advanced

DES 230 – Applying OWASP 2017: Mitigating Use of Components with Known Vulnerabilities


12 Minutes
Advanced

DES 229 – Applying OWASP 2017: Mitigating Insecure Deserialization


12 Minutes
Advanced

DES 228 – Applying OWASP 2017: Mitigating Cross Site Scripting (XSS)


12 Minutes
Advanced

DES 227 – Applying OWASP 2017: Mitigating Security Misconfiguration


12 Minutes
Advanced

DES 226 – Applying OWASP 2017: Mitigating Broken Access Control


12 Minutes
Advanced

DES 225 – Applying OWASP 2017: Mitigating XML External Entities


12 Minutes
Advanced

DES 224 – Applying OWASP 2017: Mitigating Sensitive Data Exposure


12 Minutes
Advanced

DES 223 – Applying OWASP 2017: Mitigating Broken Authentication


12 Minutes
Advanced

DES 222 – Applying OWASP 2017: Mitigating Injection


12 Minutes
Advanced

DES 202 – Cryptographic Suite Services: Encoding, Encrypting & Hashing


45 Minutes
Advanced

COD 382 – Protecting Data in Java


30 Minutes
Advanced

COD 381 – Protecting Java Code: Canonicalization, Information Disclosure and TOCTOU


25 Minutes
Advanced

COD 364 – Securing HTML5 Connectivity


20 Minutes
Advanced

COD 363- Securing HTML5 Data


20 Minutes
Advanced

COD 362 – HTML5 Built in Security Features


20 Minutes
Advanced

COD 361 – HTML5 Secure Threats


15 Minutes
Advanced

COD 352 – Creating Secure JavaScript and jQuery Code (Updated)


45 Minutes
Advanced

COD 318 – Creating Secure Android Code in Java (Updated)


45 Minutes
Advanced

COD 317 – Creating Secure iOS Code in Swift (Updated)


45 Minutes
Advanced

COD 316 – Creating Secure iOS Code in Objective C


30 Minutes
Advanced

COD 283 – Java Cryptography (UPDATED)


45 Minutes
Advanced

COD 282 – Java Authentication & Authorization


20 Minutes
Advanced

COD 281 – Java Security Model


20 Minutes
Advanced

COD 270 – Creating Secure COBOL & Mainframe Applications


25 Minutes
Advanced

COD 264 – Secure Perl Scripting (NEW)


15 Minutes
Advanced

COD 263 – Secure Bash Scripting (NEW)


15 Minutes
Advanced

COD 262 – Fundamentals of Shell and Interpreted Language Security (UPDATED)


30 Minutes
Core

COD 261 – Threats to Scripts (UPDATED)


30 Minutes
Core

COD 259 – Node.js Threats & Vulnerabilities


30 Minutes
Advanced

COD 257 – Creating Secure Python Web Applications (Updated)


45 Minutes
Advanced

COD 256 – Creating Secure Code: Ruby on Rails Foundations (Updated)


45 Minutes
Advanced

COD 255 – Creating Secure Code: Web API Foundations


120 Minutes
Advanced

COD 254 – Creating Secure Azure Applications (Updated)


45 Minutes
Advanced

COD 253 – Creating Secure AWS Cloud Applications (Updated)


45 Minutes
Advanced

COD 242 – Creating Secure SQL Server & Azure SQL DB Applications (Updated)


40 Minutes
Advanced

COD 241 – Creating Secure Oracle DB Applications


45 Minutes
Advanced

COD 237 – Defending Mobile App Code


20 Minutes
Advanced

COD 236 – Mobile App Authentication & Authorization


20 Minutes
Advanced

COD 235 – Defending Mobile Data with Cryptography


20 Minutes
Advanced

COD 234 – Mobile Threats & Mitigations


20 Minutes
Advanced

COD 230 – Insecure IoT Firmware (UPDATED)


10 Minutes
Advanced

COD 229 – Insecure IoT Mobile Interface (UPDATED)


10 Minutes
Advanced

COD 228 – Insecure IoT Communications (UPDATED)


10 Minutes
Advanced

COD 227 – Insecure IoT Network Services (UPDATED)


10 Minutes
Advanced

COD 226 – Insecure IoT Authentication & Authorization (UPDATED)


10 Minutes
Advanced

COD 225 – Insecure IoT Web Interfaces (UPDATED)


10 Minutes
Advanced

COD 222 – PCI DSS v3.2 Best Practices for Developers


60 Minutes
Advanced

COD 219 – Creating Secure Code: SAP ABAP Foundations


90 Minutes
Advanced

COD 217 – Mitigating .NET Security Threats


45 Minutes
Advanced

COD 216 – Leveraging .NET Framework Code Access Security (CAS)


30 Minutes
Advanced

COD 206 – Creating Secure C++ Code


15 Minutes
Advanced

COD 202 – Secure C Runtime Protection


15 Minutes
Advanced

COD 170 – Identifying Threats to Mainframe COBOL Applications & Data


20 Minutes
Core

COD 160 -Fundamentals of Secure Embedded Software Development (Updated)


45 Minutes
Core

COD 152 – Fundamentals of Secure Cloud Development (Updated)


20 Minutes
Core

COD 141 – Fundamentals of Database Security (Updated)


30 Minutes
Core

COD 110 – Fundamentals of Secure Mobile Development (Updated)


45 Minutes
Core

Security Innovation

  • Training
  • Services
  • Who We Help
  • Resources
  • Blog
  • About
  • Let’s Talk

Contact Us

187 Ballardvale Street, Suite A195
Wilmington, MA 01887

Phone: +1.877.839.7598

Copyright © 2019 Security Innovation, Inc. All Rights Reserved Privacy Policy