Close
Training
Overview
Blended Learning
CMD+CTRL Cyber Range
Cyber Range Overview
Cyber Range Features
Cyber Range Reporting
Cyber Range Suite
Get a Demo
CMD+CTRL Security Courses
Courses Overview
Course Features
Learning Paths
Course Previews
Security Training Course Catalog
Services
Overview
Software Penetration Testing
Pen testing Overview
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Who We Help
Overview
Development/IT Teams
Security Teams
Enterprise Information Risk Management Teams
Leadership Teams
Resources
All Resources
Guides & Videos
Webinars
Blog
About
Company Overview
Centers of Excellence
Community
Accolades
Clients
Leadership Team
News/Events
Careers
Contact Us
Let’s Talk
Training
Overview
Blended Learning
CMD+CTRL Cyber Range
Cyber Range Overview
Cyber Range Features
Cyber Range Reporting
Cyber Range Suite
Get a Demo
CMD+CTRL Security Courses
Courses Overview
Course Features
Learning Paths
Course Previews
Security Training Course Catalog
Services
Overview
Software Penetration Testing
Pen testing Overview
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Who We Help
Overview
Development/IT Teams
Security Teams
Enterprise Information Risk Management Teams
Leadership Teams
Resources
All Resources
Guides & Videos
Webinars
Blog
About
Company Overview
Centers of Excellence
Community
Accolades
Clients
Leadership Team
News/Events
Careers
Contact Us
Let’s Talk
Course Catalog
/
Subject
/
Platform
Platform
The Courses
View All Courses
Download Course Catalog
DSO 254 – DevSecOps in the Azure Cloud (Coming Soon)
20 Minutes
Advanced
DSO 253 – DevSecOps in the AWS Cloud (Coming Soon)
20 Minutes
Advanced
DES 216 – Protecting Cloud Infrastructure (New)
40 Minutes
Advanced
COD 258 – Creating Secure PHP Web Applications (NEW)
30 Minutes
Advanced
COD 251 – Defending AJAX-Enabled Web Applications (NEW)
25 Minutes
Advanced
COD 383 – Protecting Java Backend Services (New)
30 Minutes
Elite
COD 267 – Securing Python Microservices (New)
30 Minutes
Advanced
COD 309 – Securing ASP.NET MVC Applications (New)
30 Minutes
Advanced
COD 308 – Common ASP.NET MVC Vulnerabilities and Attacks (New)
45 Minutes
Advanced
DES 218 – Protecting Microservices, Containers, and Orchestration (New)
30 Minutes
Advanced
DES 214 – Securing Infrastructure Architecture (NEW)
30 Minutes
Advanced
DES 215 – Defending Infrastructure (NEW)
30 Minutes
Advanced
ENG 150 – Meeting Confidentiality, Integrity, and Availability (NEW)
30 Minutes
COD 284 – Secure Java Coding (NEW)
30 Minutes
Advanced
COD 266 – Secure Ruby Scripting (NEW)
15 Minutes
Advanced
COD 265 – Secure Python Scripting (NEW)
15 Minutes
Advanced
COD 249 – PCI DSS 11: Regularly Test Security Systems and Processes (NEW)
15 Minutes
Advanced
COD 248 – PCI DSS 6: Develop and Maintain Secure Systems and Applications (NEW)
15 Minutes
Advanced
COD 247 – PCI DSS 4: Encrypting Transmission of Cardholder Data (NEW)
15 Minutes
Advanced
COD 246 – PCI DSS 3: Protecting Stored Cardholder Data (NEW)
15 Minutes
Advanced
Protecting Sensitive Data while Scripting
30 Minutes
Advanced
TST 252 – Testing for OS Command Injection (CWE-78)
15 Minutes
Advanced
TST 231 – Testing for OWASP 2017: Insufficient Logging & Monitoring
10 Minutes
Advanced
TST 230 – Testing for OWASP 2017: Use of Components with Known Vulnerabilities
10 Minutes
Advanced
TST 229 – Testing for OWASP 2017: Insecure Deserialization
10 Minutes
Advanced
TST 228 – Testing for OWASP 2017: Cross Site Scripting (XSS)
15 Minutes
Advanced
TST 227 – Testing for OWASP 2017: Security Misconfiguration
10 Minutes
Advanced
TST 226 – Testing for OWASP 2017: Broken Access Control
10 Minutes
Advanced
TST 225 – Testing for OWASP 2017: XML External Entities
10 Minutes
Advanced
TST 224 – Testing for OWASP 2017: Sensitive Data Exposure
12 Minutes
Advanced
TST 223 – Testing for OWASP 2017: Broken Authentication
12 Minutes
Advanced
TST 222 – Testing for OWASP 2017: Injection
15 Minutes
Advanced
ENG 195 – Implementing the Microsoft SDL Threat Modeling Tool
20 Minutes
Elite
ENG 194 – Implementing Microsoft SDL Line of Business
20 Minutes
Elite
ENG 193 – Implementing the Microsoft SDL Optimization Model
12 Minutes
Elite
ENG 192- Implementing the Agile Microsoft SDL
20 Minutes
Elite
ENG 191 – Introduction to the Microsoft SDL
25 Minutes
Elite
ENG 121 – Essential Identification & Authentication
15 Minutes
Core
ENG 119 – Essential Security Audit & Accountability
15 Minutes
Core
ENG 115 – Essential System & Information Integrity
15 Minutes
Core
ENG 114 – Essential Risk Assessment
15 Minutes
Core
ENG 112 – Essential Access Control for Mobile Devices
15 Minutes
Core
ENG 110 – Essential Account Management Securitiy
15 Minutes
Core
DES 352 – Creating Secure Over the Air (OTA) Updates
90 Minutes
Advanced
DES 260 – Fundamentals of IoT Architecture & Design
30 Minutes
Advanced
DES 231 – Applying OWASP 2017: Mitigating Insufficient Logging & Monitoring Vulnerabilities
12 Minutes
Advanced
DES 230 – Applying OWASP 2017: Mitigating Use of Components with Known Vulnerabilities
12 Minutes
Advanced
DES 229 – Applying OWASP 2017: Mitigating Insecure Deserialization
12 Minutes
Advanced
DES 228 – Applying OWASP 2017: Mitigating Cross Site Scripting (XSS)
12 Minutes
Advanced
DES 227 – Applying OWASP 2017: Mitigating Security Misconfiguration
12 Minutes
Advanced
DES 226 – Applying OWASP 2017: Mitigating Broken Access Control
12 Minutes
Advanced
DES 225 – Applying OWASP 2017: Mitigating XML External Entities
12 Minutes
Advanced
DES 224 – Applying OWASP 2017: Mitigating Sensitive Data Exposure
12 Minutes
Advanced
DES 223 – Applying OWASP 2017: Mitigating Broken Authentication
12 Minutes
Advanced
DES 222 – Applying OWASP 2017: Mitigating Injection
12 Minutes
Advanced
DES 202 – Cryptographic Suite Services: Encoding, Encrypting & Hashing
45 Minutes
Advanced
COD 382 – Protecting Data in Java
30 Minutes
Advanced
COD 381 – Protecting Java Code: Canonicalization, Information Disclosure and TOCTOU
25 Minutes
Advanced
COD 364 – Securing HTML5 Connectivity
20 Minutes
Advanced
COD 363- Securing HTML5 Data
20 Minutes
Advanced
COD 362 – HTML5 Built in Security Features
20 Minutes
Advanced
COD 361 – HTML5 Secure Threats
15 Minutes
Advanced
COD 352 – Creating Secure JavaScript and jQuery Code (Updated)
45 Minutes
Advanced
COD 318 – Creating Secure Android Code in Java (Updated)
45 Minutes
Advanced
COD 317 – Creating Secure iOS Code in Swift (Updated)
45 Minutes
Advanced
COD 316 – Creating Secure iOS Code in Objective C
30 Minutes
Advanced
COD 283 – Java Cryptography (UPDATED)
45 Minutes
Advanced
COD 282 – Java Authentication & Authorization
20 Minutes
Advanced
COD 281 – Java Security Model
20 Minutes
Advanced
COD 270 – Creating Secure COBOL & Mainframe Applications
25 Minutes
Advanced
COD 264 – Secure Perl Scripting (NEW)
15 Minutes
Advanced
COD 263 – Secure Bash Scripting (NEW)
15 Minutes
Advanced
COD 262 – Fundamentals of Shell and Interpreted Language Security (UPDATED)
30 Minutes
Core
COD 261 – Threats to Scripts (UPDATED)
30 Minutes
Core
COD 259 – Node.js Threats & Vulnerabilities
30 Minutes
Advanced
COD 257 – Creating Secure Python Web Applications (Updated)
45 Minutes
Advanced
COD 256 – Creating Secure Code: Ruby on Rails Foundations (Updated)
45 Minutes
Advanced
COD 255 – Creating Secure Code: Web API Foundations
120 Minutes
Advanced
COD 254 – Creating Secure Azure Applications (Updated)
45 Minutes
Advanced
COD 253 – Creating Secure AWS Cloud Applications (Updated)
45 Minutes
Advanced
COD 242 – Creating Secure SQL Server & Azure SQL DB Applications (Updated)
40 Minutes
Advanced
COD 241 – Creating Secure Oracle DB Applications
45 Minutes
Advanced
COD 237 – Defending Mobile App Code
20 Minutes
Advanced
COD 236 – Mobile App Authentication & Authorization
20 Minutes
Advanced
COD 235 – Defending Mobile Data with Cryptography
20 Minutes
Advanced
COD 234 – Mobile Threats & Mitigations
20 Minutes
Advanced
COD 230 – Insecure IoT Firmware (UPDATED)
10 Minutes
Advanced
COD 229 – Insecure IoT Mobile Interface (UPDATED)
10 Minutes
Advanced
COD 228 – Insecure IoT Communications (UPDATED)
10 Minutes
Advanced
COD 227 – Insecure IoT Network Services (UPDATED)
10 Minutes
Advanced
COD 226 – Insecure IoT Authentication & Authorization (UPDATED)
10 Minutes
Advanced
COD 225 – Insecure IoT Web Interfaces (UPDATED)
10 Minutes
Advanced
COD 222 – PCI DSS v3.2 Best Practices for Developers
60 Minutes
Advanced
COD 219 – Creating Secure Code: SAP ABAP Foundations
90 Minutes
Advanced
COD 217 – Mitigating .NET Security Threats
45 Minutes
Advanced
COD 216 – Leveraging .NET Framework Code Access Security (CAS)
30 Minutes
Advanced
COD 206 – Creating Secure C++ Code
15 Minutes
Advanced
COD 202 – Secure C Runtime Protection
15 Minutes
Advanced
COD 170 – Identifying Threats to Mainframe COBOL Applications & Data
20 Minutes
Core
COD 160 -Fundamentals of Secure Embedded Software Development (Updated)
45 Minutes
Core
COD 152 – Fundamentals of Secure Cloud Development (Updated)
20 Minutes
Core
COD 141 – Fundamentals of Database Security (Updated)
30 Minutes
Core
COD 110 – Fundamentals of Secure Mobile Development (Updated)
45 Minutes
Core