Close
Training
CMD+CTRL Base Camp
SI-CSC Certification
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Ed TALKS
White Papers, Tipsheets, & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Request a Demo
We’re Hiring
Blog
Course Catalog
Request a Demo
We’re Hiring
Blog
Course Catalog
Training
CMD+CTRL Base Camp
SI-CSC Certification
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Ed TALKS
White Papers, Tipsheets, & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Course Catalog
/
Subject
/
Cloud
Cloud
View All Courses
Download Course Catalog
API 250 – Controlling Access to the Kubernetes API
20 Minutes
Advanced
COD 141 – Fundamentals of Database Security
30 Minutes
Core
COD 152 – Fundamentals of Secure Cloud Development
20 Minutes
Core
COD 219 – Creating Secure Code: SAP ABAP Foundations
90 Minutes
Advanced
COD 252 – Securing Google Platform Applications & Data
25 Minutes
Advanced
COD 253 – Creating Secure AWS Cloud Applications
45 Minutes
Advanced
COD 254 – Creating Secure Azure Applications
45 Minutes
Advanced
COD 267 – Securing Python Microservices
30 Minutes
Advanced
DES 202 – Cryptographic Suite Services: Encoding, Encrypting & Hashing
45 Minutes
Advanced
DES 206 – Meeting Cloud Governance and Compliance Requirements
15 Minutes
Advanced
DES 208 – Defending Against the CSA Top 11 Threats to Cloud Computing
15 Minutes
Advanced
DES 210 – Hardening Linux/Unix Systems
30 Minutes
Advanced
DES 216 – Protecting Cloud Infrastructure
40 Minutes
Advanced
DES 218 – Protecting Microservices, Containers, and Orchestration
30 Minutes
Advanced
DES 238 – Mitigating OWASP 2021 Server-Side Request Forgery (SSRF)
12 Minutes
Advanced
DES 261 – Securing Serverless Environments
20 Minutes
Advanced
DES 313 – Hardening a Kubernetes Cluster
20 Minutes
Elite
DES 314 – Hardening the Docker Engine
15 Minutes
Elite
DSO 211 – Identifying Threats to Containers in a DevSecOps Framework
20 Minutes
Advanced
DSO 253 – DevSecOps in the AWS Cloud
20 Minutes
Advanced
DSO 254 – DevSecOps in the Azure Cloud
20 Minutes
Advanced
DSO 256 – DevSecOps in the Google Cloud Platform
20 Minutes
Advanced
DSO 301 – Orchestrating Secure System and Service Configuration
20 Minutes
Elite
DSO 302 – Automated Security Testing
20 Minutes
Elite
DSO 303 – Automating Security Updates
20 Minutes
Elite
DSO 304 – Securing API Gateways in a DevSecOps Framework
20 Minutes
Elite
DSO 305 – Automating CI/CD Pipeline Compliance
20 Minutes
Elite
ICS 210 – ICS/SCADA Security Essentials
12 Minutes
Advanced
LAB 111 – Identifying Server-Side Request Forgery
5 Minutes
Advanced
LAB 122 – Identifying Insecure APIs
5 Minutes
Advanced
LAB 123 – Identifying Vertical Privilege Escalation
5 Minutes
Advanced
LAB 131 – Identifying Improper Restriction of XML External Entity Reference
5 Minutes
Elective
LAB 132 – Identifying Exposed Services
5 Minutes
Elective
LAB 133 – Identifying Exposure of Sensitive Information Through Environmental Variables
5 Minutes
LAB 134 – Identifying Plaintext Storage of a Password
5 Minutes
LAB 135 – Identifying URL Redirection to Untrusted Site
5 Minutes
LAB 136 – Identifying Improper Neutralization of Script in Attributes in a Web Page
5 Minutes
LAB 137 – Identifying Improper Authorization (NEW)
5 Minutes
Advanced
LAB 138 – Identifying Authorization Bypass Through User-Controlled Key (NEW)
5 Minutes
Advanced
LAB 139 – Identifying Use of a Key Past its Expiration Date (NEW)
5 Minutes
Advanced
LAB 211 – Defending Java Applications Against Credentials in Code Medium
10 Minutes
Advanced
LAB 212 – Defending Python Applications Against Credentials in Code Medium
10 Minutes
Advanced
LAB 213 – Defending Node.js Applications Against Credentials in Code Medium
10 Minutes
Advanced
LAB 214 – Defending C# Applications Against Credentials in Code Medium
10 Minutes
Advanced
LAB 215 – Defending Java Applications Against Business Logic Error for Input Validation
10 Minutes
Advanced
LAB 216 – Defending Python Applications Against Business Logic Error for Input Validation
10 Minutes
Advanced
LAB 217 – Defending Node.js Applications Against Business Logic Error for Input Validation
10 Minutes
Advanced
LAB 218 – Defending C# Applications Against Business Logic Error for Input Validation
10 Minutes
Advanced
LAB 224 – Defending Java Applications Against Forceful Browsing
10 Minutes
Advanced
LAB 225 – Defending Python Applications Against Forceful Browsing
10 Minutes
Advanced
LAB 226 – Defending Node.js Applications Against Forceful Browsing
10 Minutes
Advanced
LAB 227 – Defending C# Applications Against Forceful Browsing
10 Minutes
Advanced
LAB 275 – Defending Java Applications Against Command Injection (NEW)
10 Minutes
Advanced
LAB 276 – Defending Python Applications Against Command Injection (NEW)
10 Minutes
Advanced
LAB 277 – Defending Node.js Applications Against Command Injection (NEW)
10 Minutes
Advanced
LAB 278 – Defending C# Applications Against Command Injection (NEW)
10 Minutes
Advanced
LAB 279 – Defending Java Applications Against Dangerous File Upload (NEW)
10 Minutes
Advanced
LAB 280 – Defending Python Applications Against Dangerous File Upload (NEW)
10 Minutes
Advanced
LAB 281 – Defending Node.js Applications Against Dangerous File Upload (NEW)
10 Minutes
Advanced
LAB 282 – Defending C# Applications Against Dangerous File Upload (NEW)
10 Minutes
Advanced
LAB 283 – Defending Java Applications Against RegEx DoS (NEW)
10 Minutes
Advanced
LAB 284 – Defending Python Applications Against RegEx DoS (NEW)
10 Minutes
Advanced
LAB 285 – Defending Node.js Applications Against RegEx DoS (NEW)
10 Minutes
Advanced
LAB 286 – Defending C# Applications Against RegEx DoS (NEW)
10 Minutes
Advanced
SDT 307 – Testing for Server-Side Request Forgery (SSRF)
10 Minutes
Elite
TST 303 – Penetration Testing for Google Cloud Platform
20 Minutes
Elite
TST 304 – Penetration Testing for AWS Cloud
20 Minutes
Elite
TST 305 – Penetration Testing for Azure Cloud
20 Minutes
Elite