• Close
  • Training
    • CMD+CTRL Base Camp
    • Courses
      • Overview
      • Features
      • Learning Paths
      • Course Catalog
      • Customer Success
      • Try it
    • Labs
    • Cyber Range
      • Overview
      • Features
      • Reporting
      • Suite
      • Modes
      • Customer Success
      • Get Started
    • ✓ Take the AppSec Challenge
  • Services
    • Overview
    • Software Penetration Testing
      • Pen testing Overview
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
      • Medical Device Threat Modeling
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Solutions
    • Cloud & Web
    • Mobile
    • IoT & Embedded
    • Blockchain
  • Resources
    • Guides & Case Studies
    • Webinars
  • Blog
  • About
    • Company Overview
    • Ed TALKS
    • Partners
    • Community
    • Clients
    • Leadership
    • Careers
    • News
    • Contact
  • Let’s Talk
  •  
Security Innovation
  • Training
    • CMD+CTRL Base Camp
    • Courses
      • Overview
      • Features
      • Learning Paths
      • Course Catalog
      • Customer Success
      • Try it
    • Labs
    • Cyber Range
      • Overview
      • Features
      • Reporting
      • Suite
      • Modes
      • Customer Success
      • Get Started
    • ✓ Take the AppSec Challenge
  • Services
    • Overview
    • Software Penetration Testing
      • Pen testing Overview
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
      • Medical Device Threat Modeling
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Solutions
    • Cloud & Web
    • Mobile
    • IoT & Embedded
    • Blockchain
  • Resources
    • Guides & Case Studies
    • Webinars
  • Blog
  • About
    • Company Overview
    • Ed TALKS
    • Partners
    • Community
    • Clients
    • Leadership
    • Careers
    • News
    • Contact
  • Let’s Talk
  •  

Course Catalog / Subject / Back-End Server

Back-End Server

The Courses

View All Courses     Download Course Catalog

COD 287 – Java Application Server Hardening


20 Minutes
Advanced

COD 251 – Defending AJAX-Enabled Web Applications


25 Minutes
Advanced

COD 383 – Protecting Java Backend Services


30 Minutes
Elite

COD 267 – Securing Python Microservices


30 Minutes
Advanced

COD 284 – Secure Java Coding


30 Minutes
Advanced

COD 283 – Java Cryptography


45 Minutes
Advanced

COD 281 – Java Security Model


20 Minutes
Advanced

COD 256 – Creating Secure Code: Ruby on Rails Foundations


45 Minutes
Advanced

COD 255 – Creating Secure Code: Web API Foundations


20 Minutes
Advanced

COD 254 – Creating Secure Azure Applications


45 Minutes
Advanced

COD 253 – Creating Secure AWS Cloud Applications


45 Minutes
Advanced

COD 241 – Creating Secure Oracle DB Applications


45 Minutes
Advanced

COD 141 – Fundamentals of Database Security


30 Minutes
Core

Security Innovation

  • Training
  • Services
  • Solutions
  • Resources
  • Blog
  • About
  • Let’s Talk

Offices

Headquarters - Boston, MA
187 Ballardvale Street, Suite A195
Wilmington, MA 01887

Phone: +1.877.839.7598
Sales: 1.877.839.7598 x1
Support: 1.877.839.7598 x2
Email: Support
Email: PR

Pune, India
516 World Trade Center - Tower 2
Kharadi, Pune, MH 411014
Phone: +91 820 840 1411
Email: India Sales

Seattle, WA
1511 3rd Ave #808
Seattle, WA 98101

Copyright © 2022 Security Innovation, Inc. All Rights Reserved Privacy Policy