Close
Training
CMD+CTRL Base Camp
SI-CSC Certification
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Ed TALKS
White Papers, Tipsheets, & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Request a Demo
We’re Hiring
Blog
Course Catalog
Request a Demo
We’re Hiring
Blog
Course Catalog
Training
CMD+CTRL Base Camp
SI-CSC Certification
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Ed TALKS
White Papers, Tipsheets, & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Course Catalog
/
Subject
/
Linux
Linux
View All Courses
Download Course Catalog
API 250 – Controlling Access to the Kubernetes API
20 Minutes
Advanced
COD 170 – Identifying Threats to Mainframe COBOL Applications & Data
20 Minutes
Core
COD 202 – Secure C Runtime Protection
15 Minutes
Advanced
COD 261 – Threats to Scripts
30 Minutes
Advanced
COD 262 – Fundamentals of Shell and Interpreted Language Security
30 Minutes
Advanced
COD 263 – Secure Bash Scripting
15 Minutes
Advanced
COD 264 – Secure Perl Scripting
15 Minutes
Advanced
COD 265 – Secure Python Scripting
15 Minutes
Advanced
COD 266 – Secure Ruby Scripting
15 Minutes
Advanced
COD 270 – Creating Secure COBOL & Mainframe Applications
25 Minutes
Advanced
DES 202 – Cryptographic Suite Services: Encoding, Encrypting & Hashing
45 Minutes
Advanced
DES 210 – Hardening Linux/Unix Systems
30 Minutes
Advanced
DES 214 – Securing Infrastructure Architecture
30 Minutes
Advanced
DES 215 – Defending Infrastructure
30 Minutes
Advanced
DES 218 – Protecting Microservices, Containers, and Orchestration
30 Minutes
Advanced
ENG 110 – Essential Account Management Security
15 Minutes
Core
ENG 114 – Essential Risk Assessment
15 Minutes
Core
ENG 115 – Essential System & Information Integrity
15 Minutes
Core
ENG 119 – Essential Security Audit & Accountability
15 Minutes
Core
ENG 121 – Essential Identification & Authentication
15 Minutes
Core
ICS 210 – ICS/SCADA Security Essentials
12 Minutes
Advanced