• Close
  • Training
    • CMD+CTRL Base Camp
    • SI-CSC Certification
    • Courses
      • Overview
      • Features
      • Learning Paths
      • Course Catalog
      • Customer Success
      • Try it
    • Labs
    • Cyber Range
      • Overview
      • Environments & Modes
      • Reporting
      • Customer Success
      • Get Started
    • Try it | Lab Journey series
    • Try it | Take the AppSec Challenge
  • Services
    • Overview
    • Software Penetration Testing
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
      • Medical Device Threat Modeling
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Solutions
    • Cloud & Web
    • Mobile
    • IoT & Embedded
    • Blockchain
  • Resources
    • Ed TALKS
    • White Papers, Tipsheets, & Case Studies
    • Webinars
  • About Us
    • Company Overview
    • 20 Years of Innovation
    • Closing the Skills Gap
    • Diversity, Equity & Inclusion
    • Clients
    • Leadership
    • Careers
    • News & Events
    • Contact
  • Let’s Talk
  • Request a Demo
  • We’re Hiring
  • Blog
  • Course Catalog
Security Innovation
  • Request a Demo
  • We’re Hiring
  • Blog
  • Course Catalog
  • Training
    • CMD+CTRL Base Camp
    • SI-CSC Certification
    • Courses
      • Overview
      • Features
      • Learning Paths
      • Course Catalog
      • Customer Success
      • Try it
    • Labs
    • Cyber Range
      • Overview
      • Environments & Modes
      • Reporting
      • Customer Success
      • Get Started
    • Try it | Lab Journey series
    • Try it | Take the AppSec Challenge
  • Services
    • Overview
    • Software Penetration Testing
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
      • Medical Device Threat Modeling
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Solutions
    • Cloud & Web
    • Mobile
    • IoT & Embedded
    • Blockchain
  • Resources
    • Ed TALKS
    • White Papers, Tipsheets, & Case Studies
    • Webinars
  • About Us
    • Company Overview
    • 20 Years of Innovation
    • Closing the Skills Gap
    • Diversity, Equity & Inclusion
    • Clients
    • Leadership
    • Careers
    • News & Events
    • Contact
  • Let’s Talk

Course Catalog / Subject / API

API

View All Courses     Download Course Catalog

API 213 – Mitigating APIs Mass Assignment


15 Minutes
Advanced

API 214 – Mitigating APIs Improper Asset Management


15 Minutes
Advanced

COD 214 – Creating Secure GO Applications


30 Minutes
Advanced

COD 216 – Leveraging .NET Framework Code Access Security (CAS)


60 Minutes
Advanced

COD 257 – Creating Secure Python Web Applications


45 Minutes
Advanced

COD 258 – Creating Secure PHP Web Applications


30 Minutes
Advanced

COD 264 – Secure Perl Scripting


15 Minutes
Advanced

COD 265 – Secure Python Scripting


15 Minutes
Advanced

COD 266 – Secure Ruby Scripting


15 Minutes
Advanced

COD 267 – Securing Python Microservices


30 Minutes
Advanced

COD 283 – Java Cryptography


45 Minutes
Advanced

COD 286 – Creating Secure React User Interfaces


10 Minutes
Advanced

COD 288 – Java Public Key Cryptography (NEW)


20 Minutes
Advanced

COD 301 – Secure C Buffer Overflow Mitigations


45 Minutes
Elite

COD 307 – Protecting Data in C++


25 Minutes
Elite

COD 309 – Securing ASP.NET MVC Applications


30 Minutes
Elite

COD 316 – Creating Secure iOS Code in Objective C


30 Minutes
Elite

COD 317 – Protecting Data on iOS in Swift


20 Minutes
Elite

COD 318 – Protecting Data on Android in Java


20 Minutes
Elite

COD 319 – Preventing Vulnerabilities in Android Code in Java


20 Minutes
Elite

COD 363 – Securing HTML5 Data


20 Minutes
Elite

COD 364 – Securing HTML5 Connectivity


20 Minutes
Elite

COD 366 – Creating Secure Kotlin Applications


20 Minutes
Elite

COD 383 – Protecting Java Backend Services (UPDATED)


30 Minutes
Elite

DES 207 – Mitigating OWASP API Security Top 10


15 Minutes
Advanced

DES 216 – Protecting Cloud Infrastructure


40 Minutes
Advanced

DES 218 – Protecting Microservices, Containers, and Orchestration


30 Minutes
Advanced

DES 283 – OWASP IoT3: Mitigating Insecure Ecosystem Interfaces


12 Minutes
Elective

DSO 253 – DevSecOps in the AWS Cloud


20 Minutes
Advanced

DSO 254 – DevSecOps in the Azure Cloud


20 Minutes
Advanced

DSO 301 – Orchestrating Secure System and Service Configuration


20 Minutes
Elite

DSO 304 – Securing API Gateways in a DevSecOps Framework


20 Minutes
Elite

ENG 211 – How to Create Application Security Design Requirements


15 Minutes
Advanced

ENG 311 – Attack Surface Analysis & Reduction


25 Minutes
Elite

LAB 122 – Identifying Insecure APIs


5 Minutes
Advanced

TST 206 – ASVS Requirements for Developers


20 Minutes
Advanced

Security Innovation

Company Links

  • Training
  • Services
  • Solutions
  • Resources
  • About Us

Offices

Headquarters – Boston, MA
187 Ballardvale Street, Suite A195
Wilmington, MA 01887

Phone: +1.877.839.7598
Sales: 1.877.839.7598 x1
Support: 1.877.839.7598 x2
Email: Support
Email: PR

Pune, India
516 World Trade Center – Tower 2
Kharadi, Pune, MH 411014
Phone: +91 820 840 1411
Email: India Sales

Seattle, WA
1511 3rd Ave #808
Seattle, WA 98101

Copyright © Security Innovation, Inc. All Rights Reserved.
Privacy Policy  |  Vulnerability Disclosure  |