Close
Training
CMD+CTRL Base Camp
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
Pen testing Overview
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Guides & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Ed TALKS
We’re Hiring
Blog
Course Catalog
Ed TALKS
We’re Hiring
Blog
Course Catalog
Training
CMD+CTRL Base Camp
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
Pen testing Overview
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Guides & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Course Catalog
/
Subject
/
Standard
Standard
View All Courses
Download Course Catalog
LAB 335 ATT&CK: Unsecured Credentials
12 Minutes
Elite
LAB 334 ATT&CK: Create Account
12 Minutes
Elite
LAB 332 ATT&CK: Network Share Discovery
12 Minutes
Elite
LAB 331 ATT&CK: Network Service Discovery
12 Minutes
Elite
LAB 262 Defending Node.js Applications Against Sensitive Information in Error Messages
10 Minutes
Advanced
LAB 261 Defending Python Applications Against Sensitive Information in Error Messages
10 Minutes
Advanced
LAB 260 Defending C# Applications Against Sensitive Information in Error Messages
10 Minutes
Advanced
LAB 236 Defending Java Applications Against Sensitive Information in Error Messages
10 Minutes
Advanced
LAB 130 Identifying Generation of Predictable Numbers or Identifiers
5 Minutes
Core
LAB 129 Identifying Error Message Containing Sensitive Information
5 Minutes
Core
LAB 128 Identifying Unverified Password Change
5 Minutes
Core
LAB 127 Identifying Security Logging and Monitoring Failures
5 Minutes
Core
API 213 Mitigating APIs Mass Assignment
15 Minutes
Advanced
ICS 310 Protecting Information and System Integrity in Industrial Control System Environments
15 Minutes
Elite
API 214 Mitigating APIs Improper Asset Management
15 Minutes
Advanced
CYB 250 Cyber Threat Hunting: Tactics, Techniques, and Procedures (TTP)
20 Minutes
Elite
DES 314 Hardening the Docker Engine
15 Minutes
Elite
LAB 247 Defending Node.js Applications Against Weak PRNG (NEW)
10 Minutes
Advanced
LAB 229 Defending Java Applications Against Weak PRNG (NEW)
10 Minutes
Advanced
LAB 239 Defending C# Applications Against Weak PRNG (NEW)
10 Minutes
Advanced
LAB 246 Defending Node.js Applications Against Weak AES ECB Mode Encryption (NEW)
10 Minutes
Advanced
LAB 228 Defending Java Applications Against Weak AES ECB Mode Encryption (NEW)
10 Minutes
Advanced
LAB 238 Defending C# Applications Against Weak AES ECB Mode Encryption (NEW)
10 Minutes
Advanced
LAB 249 Defending Python Applications Against Plaintext Password Storage (NEW)
10 Minutes
Advanced
LAB 245 Defending Node.js Applications Against Plaintext Password Storage (NEW)
10 Minutes
Advanced
LAB 235 Defending Java Applications Against Plaintext Password Storage (NEW)
10 Minutes
Advanced
LAB 248 Defending Node.js Applications Against Parameter Tampering (NEW)
10 Minutes
Advanced
LAB 234 Defending Java Applications Against Parameter Tampering (NEW)
10 Minutes
Advanced
LAB 126 Identifying Information Leakage (NEW)
5 Minutes
Core
LAB 125 Identifying Buffer Overflow (NEW)
5 Minutes
Core
LAB 124 Identifying Horizontal Privilege Escalation (NEW)
5 Minutes
Core
LAB 111 Identifying Server-Side Request Forgery (NEW)
5 Minutes
Core
CYB 210 Cybersecurity Incident Response (NEW)
12 Minutes
DES 313 Hardening a Kubernetes Cluster (NEW)
20 Minutes
Elite
API 211 Mitigating APIs Broken Object Level Authorization (NEW)
15 Minutes
Advanced
DES 209 Authentication and Lifecycle Management (NEW)
15 Minutes
Advanced
API 210 Mitigating APIs Lack of Resources & Rate Limiting (NEW)
15 Minutes
Advanced
DSO 212 Fundamentals of Zero Trust Security (NEW)
15 Minutes
Advanced
LAB 324 ATT&CK: Exploiting Java Web Application Server Misconfiguration (NEW)
12 Minutes
Elite
LAB 323 ATT&CK: Exploiting Vulnerable Java Web Application Server Software (NEW)
12 Minutes
Elite
LAB 315 ATT&CK: Updating Vulnerable Java Web Application Server Software (NEW)
12 Minutes
Elite
LAB 244 Defending Java Applications Against Security Misconfiguration (NEW)
12 Minutes
Advanced
LAB 243 Defending Python Applications Against eXternal XML Entity (XXE) Vulnerabilities (NEW)
10 Minutes
Advanced
LAB 242 Defending Node.js Applications Against eXternal XML Entity (XXE) Vulnerabilities (NEW)
10 Minutes
Advanced
LAB 241 Defending C# Applications Against eXternal XML Entity (XXE) Vulnerabilities (NEW)
10 Minutes
Advanced
LAB 240 Defending Java Applications Against eXternal XML Entity (XXE) Vulnerabilities (NEW)
10 Minutes
Advanced
LAB 223 Defending Node.js Applications Against SQL Injection (NEW)
10 Minutes
Advanced
LAB 222 Defending Python Applications Against SQL Injection (NEW)
10 Minutes
Advanced
LAB 221 Defending C# Applications Against SQL Injection (NEW)
10 Minutes
Advanced
LAB 123 Identifying Vertical Privilege Escalation (NEW)
5 Minutes
Advanced
LAB 122 Identifying Insecure APIs (NEW)
5 Minutes
Advanced
LAB 121 Identifying Vulnerable and Outdate Components (NEW)
5 Minutes
Advanced
LAB 113 Identifying Cryptographic Failures (NEW)
5 Minutes
Advanced
SDT 310 Testing for Security Logging and Monitoring Failures (NEW)
10 Minutes
Elite
SDT 309 Testing for Vulnerable and Outdated Components (NEW)
10 Minutes
Elite
SDT 308 Testing for Software and Data Integrity Failures (NEW)
10 Minutes
Elite
SDT 307 Testing for Server-Side Request Forgery (SSRF) (NEW)
10 Minutes
Elite
SDT 306 Testing for Security Misconfiguration (NEW)
10 Minutes
Elite
SDT 305 Testing for Broken Access Control (NEW)
10 Minutes
Elite
SDT 304 Testing for Insecure Design (NEW)
10 Minutes
Elite
SDT 303 Testing for Cryptographic Failures (NEW)
10 Minutes
Elite
SDT 302 Testing for Identification and Authentication Failures (NEW)
10 Minutes
Elite
SDT 301 Testing for Injection (NEW)
10 Minutes
Elite
DES 241 Mitigating OWASP 2021 Security Logging and Monitoring Failures (NEW)
12 Minutes
Advanced
DES 240 Mitigating OWASP 2021 Vulnerable and Outdated Components (NEW)
12 Minutes
Advanced
DES 239 Mitigating OWASP 2021 Software and Data Integrity Failures (NEW)
12 Minutes
Advanced
DES 238 Mitigating OWASP 2021 Server-Side Request Forgery (SSRF) (NEW)
12 Minutes
Advanced
DES 237 Mitigating OWASP 2021 Security Misconfiguration (NEW)
12 Minutes
Advanced
DES 236 Mitigating OWASP 2021 Broken Access Control (NEW)
12 Minutes
Advanced
DES 235 Mitigating OWASP 2021 Insecure Design (NEW)
12 Minutes
Advanced
DES 234 – Mitigating OWASP 2021 Cryptographic Failures (NEW)
12 Minutes
Advanced
DES 233 – Mitigating OWASP 2021 Identification and Authentication Failures (NEW)
12 Minutes
Advanced
DES 232 – Mitigating OWASP 2021 Injection (NEW)
12 Minutes
Advanced
LAB 330 ATT&CK: Exploiting Java SQL Injection to Extract Password Hashes (NEW)
15 Minutes
Elite
LAB 322 ATT&CK: Exploiting Windows File Sharing Server with External Remote Services (NEW)
20 Minutes
Elite
LAB 321 ATT&CK: Password Cracking (NEW)
5 Minutes
Elite
LAB 237 Defending Java Applications Against SQL Injection (NEW)
20 Minutes
Advanced
LAB 233 Defending Node.js Applications Against XSS (NEW)
15 Minutes
Advanced
LAB 232 Defending C# Applications Against XSS (NEW)
15 Minutes
Advanced
LAB 231 Defending Python Applications Against XSS (NEW)
15 Minutes
Advanced
LAB 230 Defending Java Applications Against XSS (NEW)
15 Minutes
Advanced
LAB 220 Defending Against Hard-Coded Secrets (NEW)
5 Minutes
Advanced
LAB 120 Identifying XML Injection (NEW)
5 Minutes
Core
LAB 119 Identifying Persistent XSS (NEW)
5 Minutes
Advanced
LAB 118 Identifying Weak File Upload Validation (NEW)
5 Minutes
Advanced
LAB 117 Identifying Hidden Form Field (NEW)
5 Minutes
Advanced
LAB 116 Identifying Forceful Browsing (NEW)
5 Minutes
Advanced
LAB 115 Identifying Reflective XSS (NEW)
5 Minutes
Advanced
LAB 114 Identifying Cookie Tampering (NEW)
5 Minutes
Advanced
LAB 110 – Identifying Sensitive Data Exposure Vulnerability Identification
7 Minutes
Advanced
LAB 109 – Identifying Security Misconfiguration Vulnerabilities
5 Minutes
Advanced
LAB 108 – Identifying Reverse Engineering Vulnerabilities
8 Minutes
Advanced
LAB 107 – Identifying Injection Vulnerabilities
7 Minutes
Advanced
LAB 106 – Identifying Cross-Site Scripting Vulnerabilities
7 Minutes
Advanced
LAB 105 – Identifying Credential Dumping: Vulnerability Identification
7 Minutes
Advanced
LAB 104 – Identifying Business Logic Flaw Vulnerabilities
7 Minutes
Advanced
LAB 103 – Identifying Broken User Authentication Vulnerabilities
7 Minutes
Advanced
LAB 102 – Identifying Broken Object-Level Authorization Vulnerabilities
5 Minutes
Advanced
LAB 101 – Identifying Broken Access Control Vulnerabilities
5 Minutes
Advanced
TST 305 – Penetration Testing for Azure Cloud
20 Minutes
Elite
DES 217 – Securing Terraform Infrastructure and Resources
20 Minutes
Advanced
DES 208 – Defending Against the CSA Top 11 Threats to Cloud Computing
15 Minutes
Advanced
DES 207 – Mitigating OWASP API Security Top 10
15 Minutes
Advanced
TST 304 – Penetration Testing for AWS Cloud
20 Minutes
Elite
TST 303 – Penetration Testing for Google Cloud Platform
20 Minutes
Elite
DSO 256 – DevSecOps in the Google Cloud Platform
20 Minutes
Advanced
COD 252 – Securing Google Platform Applications & Data
25 Minutes
Advanced
SDT 325 – Testing for NULL Pointer Dereference
10 Minutes
Elite
SDT 324 – Testing for Improper Restriction of Operations within the Bounds of a Memory Buffer
10 Minutes
Elite
SDT 323 – Testing for Improper Input Validation
10 Minutes
Elite
SDT 322 – Testing for Improper Privilege Management
10 Minutes
Elite
SDT 321 – Testing for Uncontrolled Resource Consumption
10 Minutes
Elite
SDT 320 – Testing for Out-of-bounds Write
10 Minutes
Elite
SDT 319 – Testing for Out-of-bounds Read
10 Minutes
Elite
SDT 318 – Testing for Insufficiently Protected Credentials
10 Minutes
Elite
SDT 317 – Testing for Improper Control of Generation of Code
10 Minutes
Elite
CYB 301 – Fundamentals of Ethical Hacking
15 Minutes
Elite
SDT 326 – Testing for Use After Free
10 Minutes
Elite
ATK 201 – Using the MITRE ATT&CK Framework
15 Minutes
Advanced
COD 386 – Preventing Integer Overflows in Java Code
8 Minutes
Elite
COD 385 – Preventing Race Conditions in Java Code
8 Minutes
Elite
COD 384 – Protecting Java from Information Disclosure
8 Minutes
Elite
COD 324 – Protecting C# from XML Injection
8 Minutes
Elite
COD 319 – Preventing Vulnerabilities in Android Code in Java
20 Minutes
Elite
COD 315 – Preventing Vulnerabilities in iOS Code in Swift
20 Minutes
Elite
COD 287 – Java Application Server Hardening
20 Minutes
Advanced
TST 206 – ASVS Requirements for Developers
20 Minutes
Advanced
ENG 212 – Implementing Secure Software Operations
20 Minutes
Advanced
DSO 306 – Implementing Infrastructure as Code
20 Minutes
Elite
DES 312 – Protecting Cardholder Data
20 Minutes
Elite
DES 206 – Meeting Cloud Governance and Compliance Requirements
15 Minutes
Advanced
DSO 307 – Secure Secrets Management
20 Minutes
Elite
COD 286 – Creating Secure React User Interfaces (UPDATED)
10 Minutes
Advanced
COD 285 – Developing Secure Angular Applications
30 Minutes
Advanced
ENG 151 – Fundamentals of Privacy Protection
10 Minutes
Core
DSO 305 – Automating CI/CD Pipeline Compliance
20 Minutes
Elite
DSO 304 – Securing API Gateways in a DevSecOps Framework
20 Minutes
Elite
DSO 303 – Automating Security Updates
20 Minutes
Elite
DSO 302- Automated Security Testing
20 Minutes
Elite
DSO 301 – Orchestrating Secure System and Service Configuration
20 Minutes
Elite
DSO 211 – Identifying Threats to Containers in a DevSecOps Framework
20 Minutes
Advanced
DSO 206 – Securing the Open Source Supply Chain
15 Minutes
Advanced
DES 282 – OWASP IoT2: Mitigating Insecure Network Services
12 Minutes
Advanced
DES 271 – OWASP M1: Mitigating Improper Platform Usage
12 Minutes
Advanced
DES 272 – OWASP M2: Mitigating Insecure Data Storage
12 Minutes
Advanced
DES 273 – OWASP M3: Mitigating Insecure Communication
12 Minutes
Advanced
DES 274 – OWASP M4: Mitigating Insecure Authentication
12 Minutes
Advanced
DES 275 – OWASP M5: Mitigating Insufficient Cryptography
12 Minutes
Advanced
DES 277 – OWASP M7: Mitigating Client Code Quality
12 Minutes
Advanced
DES 278 – OWASP M8: Mitigating Code Tampering
12 Minutes
Advanced
DES 279 – OWASP M9: Mitigating Reverse Engineering
12 Minutes
Advanced
DES 280 – OWASP M10: Mitigating Extraneous Functionality
12 Minutes
Advanced
DES 281 – OWASP IoT1: Mitigating Weak, Guessable or Hardcoded Passwords
12 Minutes
Advanced
DES 283 – OWASP IoT3: Mitigating Insecure Ecosystem Interfaces
12 Minutes
Advanced
DES 284 – OWASP IoT4: Mitigating Lack of Secure Update Mechanism
12 Minutes
Advanced
DES 285 – OWASP IoT5: Mitigating Use of Insecure or Outdated Components
12 Minutes
Advanced
DES 286 – OWASP IoT6: Mitigating Insufficient Privacy Protection
12 Minutes
Advanced
DES 287 – OWASP IoT7: Mitigating Insecure Data Transfer and Storage
12 Minutes
Advanced
DES 288 – OWASP IoT8: Mitigating Lack of Device Management
12 Minutes
Advanced
DES 289 – OWASP IoT9: Mitigating Insecure Default Settings
12 Minutes
Advanced
DES 276 – OWASP M6: Mitigating Insecure Authorization
12 Minutes
Advanced
DES 290 – OWASP IoT10 Mitigating Lack of Physical Hardening
12 Minutes
Advanced
TST 302 – Application Penetration Testing
45 Minutes
Elite
TST 301 – Infrastructure Penetration Testing
45 Minutes
Elite
ENG 354 – Authorizing and Monitoring System Controls within the RMF
20 Minutes
Elite
ENG 353 – Selecting, Implementing and Assessing Controls within the RMF
20 Minutes
Elite
ENG 352 – Categorizing Systems and Information within the RMF
10 Minutes
Elite
DSO 254 – DevSecOps in the Azure Cloud
20 Minutes
Advanced
DSO 253 – DevSecOps in the AWS Cloud
20 Minutes
Advanced
DSO 205 – Securing the COTS Supply Chain
15 Minutes
Advanced
DES 306 – Creating a Secure Blockchain Network
20 Minutes
Elite
DES 305 – Protecting Existing Blockchain Assets
20 Minutes
Elite
DES 210 – Hardening Linux/Unix Systems
30 Minutes
Advanced
TST 360 – Penetration Testing for Authentication Vulnerabilities
12 Minutes
Elite
TST 359 – Penetration Testing Network Infrastructure
12 Minutes
Elite
TST 358 – Penetration Testing Wireless Networks
12 Minutes
Elite
TST 357 – Penetration Testing for Hardcoded Secrets
12 Minutes
Elite
TST 356 – Penetration Testing for Cross-Site Scripting (XSS)
12 Minutes
Elite
TST 355 – Penetration Testing for Authorization Vulnerabilities
12 Minutes
Elite
TST 354 – Penetration Testing for Memory Corruption Vulnerabilities
12 Minutes
Elite
TST 353 – Penetration Testing for SQL Injection
12 Minutes
Elite
TST 352 – Penetration Testing for Injection Vulnerabilities
12 Minutes
Elite
TST 351 – Penetration Testing for TLS Vulnerabilities
12 Minutes
Elite
TST 202 – Penetration Testing Fundamentals
25 Minutes
Advanced
DSO 201 – Fundamentals of Secure DevOps
30 Minutes
Advanced
DES 255 – Securing the IoT Update Process
30 Minutes
Advanced
DES 151 – Fundamentals of the PCI Secure SLC Standard
25 Minutes
Core
DES 216 – Protecting Cloud Infrastructure
40 Minutes
Advanced
COD 258 – Creating Secure PHP Web Applications
30 Minutes
Advanced
COD 251 – Defending AJAX-Enabled Web Applications
25 Minutes
Advanced
TST 205 – Performing Vulnerability Scans
45 Minutes
Advanced
ENG 351 – Preparing the Risk Management Framework
20 Minutes
Elite
ENG 251 – Risk Management Foundations
20 Minutes
Advanced
COD 383 – Protecting Java Backend Services
30 Minutes
Elite
COD 267 – Securing Python Microservices
30 Minutes
Advanced
COD 309 – Securing ASP.NET MVC Applications
30 Minutes
Elite
COD 308 – Common ASP.NET MVC Vulnerabilities and Attacks
45 Minutes
Elite
DES 218 – Protecting Microservices, Containers, and Orchestration
30 Minutes
Advanced
COD 214 – Creating Secure GO Applications
30 Minutes
Advanced
DES 214 – Securing Infrastructure Architecture
30 Minutes
Advanced
DES 215 – Defending Infrastructure
30 Minutes
Advanced
ENG 150 – Meeting Confidentiality, Integrity, and Availability
30 Minutes
Core
COD 284 – Secure Java Coding
30 Minutes
Advanced
COD 266 – Secure Ruby Scripting
15 Minutes
Advanced
COD 265 – Secure Python Scripting
15 Minutes
Advanced
COD 249 – PCI DSS 11: Regularly Test Security Systems and Processes
15 Minutes
Advanced
COD 248 – PCI DSS 6: Develop and Maintain Secure Systems and Applications
15 Minutes
Advanced
COD 247 – PCI DSS 4: Encrypting Transmission of Cardholder Data
15 Minutes
Advanced
COD 246 – PCI DSS 3: Protecting Stored Cardholder Data
15 Minutes
Advanced
COD 108 – Software Operations and Maintenance
10 Minutes
Core
COD 107 – Secure Software Deployment
10 Minutes
Core
COD 106 – The Importance of Software Integration and Testing
15 Minutes
Core
COD 105 – Secure Software Development
20 Minutes
Core
COD 104 – Designing Secure Software
15 Minutes
Core
SDT 311 – Testing for Integer Overflow or Wraparound
15 Minutes
Elite
SDT 315 – Testing for Incorrect Permission Assignment for Critical Resource
15 Minutes
Elite
SDT 312 – Testing for (Path Traversal) Improper Limitation of a Pathname to a Restricted Directory
15 Minutes
Elite
SDT 313 – Testing for (CSRF) Cross Site Request Forgery
15 Minutes
Elite
SDT 314 – Testing for Unrestricted Upload of File with Dangerous Type
15 Minutes
Elite
SDT 316- Testing for Use of Hard-Coded Credentials
15 Minutes
Elite
TST 101 – Fundamentals of Security Testing
20 Minutes
Core
ENG 312 – How to Perform a Security Code Review
30 Minutes
Elite
ENG 311 – Attack Surface Analysis & Reduction
25 Minutes
Elite
ENG 211 – How to Create Application Security Design Requirements
15 Minutes
Advanced
ENG 205 – Fundamentals of Threat Modeling
45 Minutes
Advanced
ENG 195 – Implementing the Microsoft SDL Threat Modeling Tool
20 Minutes
Core
ENG 194 – Implementing Microsoft SDL Line of Business
20 Minutes
Core
ENG 193 – Implementing the Microsoft SDL Optimization Model
12 Minutes
Core
ENG 192- Implementing the Agile Microsoft SDL
20 Minutes
Core
ENG 191 – Introduction to the Microsoft SDL
25 Minutes
Core
ENG 127 – Essential Media Protection
15 Minutes
Core
ENG 126 – Essential Security Maintenance Policies
15 Minutes
Core
ENG 125 – Essential Data Protection
15 Minutes
Core
ENG 124 – Essential Application Protection
15 Minutes
Core
ENG 123 – Essential Security Engineering Principles
15 Minutes
Core
ENG 122 – Essential Physical & Environmental Protection
15 Minutes
Core
ENG 121 – Essential Identification & Authentication
15 Minutes
Core
ENG 120 – Essential Security Assessment & Authorization
15 Minutes
Core
ENG 119 – Essential Security Audit & Accountability
15 Minutes
Core
ENG 118 – Essential Incident Response
15 Minutes
Core
ENG 117 – Essential Information Security Program Planning
15 Minutes
Core
ENG 116 – Essential Security Planning Policy & Procedures
15 Minutes
Core
ENG 115 – Essential System & Information Integrity
15 Minutes
Core
ENG 114 – Essential Risk Assessment
15 Minutes
Core
ENG 113 – Essential Secure Configuration Management
15 Minutes
Core
ENG 112 – Essential Access Control for Mobile Devices
15 Minutes
Core
ENG 111 – Essential Session Management Security
15 Minutes
Core
ENG 110 – Essential Account Management Security
15 Minutes
Core
DES 311 – Creating Secure Application Architecture
45 Minutes
Elite
DES 260 – Fundamentals of IoT Architecture & Design
30 Minutes
Advanced
DES 212 – Architecture Risk Analysis & Remediation
30 Minutes
Advanced
DES 205 – Message Integrity Cryptographic Functions
45 Minutes
Advanced
DES 204 – Role of Cryptography in Application Development
15 Minutes
Advanced
DES 203 – Cryptographic Components: Randomness, Algorithms, and Key Management
15 Minutes
Advanced
DES 202 – Cryptographic Suite Services: Encoding, Encrypting & Hashing
45 Minutes
Advanced
DES 101 – Fundamentals of Secure Architecture
20 Minutes
Core
COD 382 – Protecting Data in Java
30 Minutes
Elite
COD 381 – Preventing Path Traversal Attacks in Java
8 Minutes
Elite
COD 380 – Preventing SQL Injection in Java
8 Minutes
Elite
COD 364 – Securing HTML5 Connectivity
20 Minutes
Elite
COD 363- Securing HTML5 Data
20 Minutes
Elite
COD 362 – HTML5 Built in Security Features
20 Minutes
Elite
COD 361 – HTML5 Secure Threats
15 Minutes
Elite
COD 352 – Creating Secure JavaScript and jQuery Code
45 Minutes
Elite
COD 323 – Using Encryption with C#
20 Minutes
Elite
COD 322 – Protecting C# from SQL Injection
8 Minutes
Elite
COD 321 – Protecting C# from Integer Overflows & Canonicalization
30 Minutes
Elite
COD 318 – Protecting Data on Android in Java
20 Minutes
Elite
COD 317 – Protecting Data on iOS in Swift
20 Minutes
Elite
COD 316 – Creating Secure iOS Code in Objective C
30 Minutes
Elite
COD 307 – Protecting Data in C++
25 Minutes
Elite
COD 303 – Common C Vulnerabilities & Attacks
20 Minutes
Elite
COD 302 -Secure C Memory Management
20 Minutes
Elite
COD 301 – Secure C Buffer Overflow Mitigations
45 Minutes
Elite
COD 283 – Java Cryptography
45 Minutes
Advanced
COD 281 – Java Security Model
20 Minutes
Advanced
COD 270 – Creating Secure COBOL & Mainframe Applications
25 Minutes
Advanced
COD 264 – Secure Perl Scripting
15 Minutes
Advanced
COD 263 – Secure Bash Scripting
15 Minutes
Advanced
COD 262 – Fundamentals of Shell and Interpreted Language Security
30 Minutes
Advanced
COD 261 – Threats to Scripts
30 Minutes
Advanced
COD 259 – Node.js Threats & Vulnerabilities
30 Minutes
Advanced
COD 257 – Creating Secure Python Web Applications
45 Minutes
Advanced
COD 256 – Creating Secure Code: Ruby on Rails Foundations
45 Minutes
Advanced
COD 255 – Creating Secure Code: Web API Foundations
20 Minutes
Advanced
COD 254 – Creating Secure Azure Applications
45 Minutes
Advanced
COD 253 – Creating Secure AWS Cloud Applications
45 Minutes
Advanced
COD 242 – Creating Secure SQL Server & Azure SQL DB Applications
40 Minutes
Advanced
COD 241 – Creating Secure Oracle DB Applications
45 Minutes
Advanced
COD 219 – Creating Secure Code: SAP ABAP Foundations
90 Minutes
Advanced
COD 217 – Mitigating .NET Security Threats
45 Minutes
Advanced
COD 216 – Leveraging .NET Framework Code Access Security (CAS)
30 Minutes
Advanced
COD 207 – Communication Security in C++
15 Minutes
Advanced
COD 206 – Creating Secure C++ Code
15 Minutes
Advanced
COD 202 – Secure C Runtime Protection
15 Minutes
Advanced
COD 201 – Secure C Encrypted Network Communications
15 Minutes
Advanced
COD 170 – Identifying Threats to Mainframe COBOL Applications & Data
20 Minutes
Core
COD 160 -Fundamentals of Secure Embedded Software Development
45 Minutes
Core
COD 152 – Fundamentals of Secure Cloud Development
20 Minutes
Core
COD 141 – Fundamentals of Database Security
30 Minutes
Core
COD 110 – Fundamentals of Secure Mobile Development
45 Minutes
Core
AWA 102 – Secure Software Concepts (UPDATED)
30 Minutes
Core
AWA 101 – Fundamentals of Application Security
30 Minutes
Core