• Close
  • Training
    • CMD+CTRL Base Camp
    • Courses
      • Overview
      • Features
      • Learning Paths
      • Course Catalog
      • Customer Success
      • Try it
    • Labs
    • Cyber Range
      • Overview
      • Environments & Modes
      • Reporting
      • Customer Success
      • Get Started
    • Try it | Lab Journey series
    • Try it | Take the AppSec Challenge
  • Services
    • Overview
    • Software Penetration Testing
      • Pen testing Overview
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
      • Medical Device Threat Modeling
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Solutions
    • Cloud & Web
    • Mobile
    • IoT & Embedded
    • Blockchain
  • Resources
    • Guides & Case Studies
    • Webinars
  • About Us
    • Company Overview
    • 20 Years of Innovation
    • Closing the Skills Gap
    • Diversity, Equity & Inclusion
    • Clients
    • Leadership
    • Careers
    • News & Events
    • Contact
  • Let’s Talk
  • Ed TALKS
  • We’re Hiring
  • Blog
  • Course Catalog
Security Innovation
  • Ed TALKS
  • We’re Hiring
  • Blog
  • Course Catalog
  • Training
    • CMD+CTRL Base Camp
    • Courses
      • Overview
      • Features
      • Learning Paths
      • Course Catalog
      • Customer Success
      • Try it
    • Labs
    • Cyber Range
      • Overview
      • Environments & Modes
      • Reporting
      • Customer Success
      • Get Started
    • Try it | Lab Journey series
    • Try it | Take the AppSec Challenge
  • Services
    • Overview
    • Software Penetration Testing
      • Pen testing Overview
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
      • Medical Device Threat Modeling
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Solutions
    • Cloud & Web
    • Mobile
    • IoT & Embedded
    • Blockchain
  • Resources
    • Guides & Case Studies
    • Webinars
  • About Us
    • Company Overview
    • 20 Years of Innovation
    • Closing the Skills Gap
    • Diversity, Equity & Inclusion
    • Clients
    • Leadership
    • Careers
    • News & Events
    • Contact
  • Let’s Talk

Course Catalog / Subject / API

API

View All Courses     Download Course Catalog

API 213 Mitigating APIs Mass Assignment


15 Minutes
Advanced

API 214 Mitigating APIs Improper Asset Management


15 Minutes
Advanced

LAB 122 Identifying Insecure APIs (NEW)


5 Minutes
Advanced

DES 207 – Mitigating OWASP API Security Top 10


15 Minutes
Advanced

COD 319 – Preventing Vulnerabilities in Android Code in Java


20 Minutes
Elite

TST 206 – ASVS Requirements for Developers


20 Minutes
Advanced

COD 366 – Creating Secure Kotlin Applications


20 Minutes
Elite

COD 286 – Creating Secure React User Interfaces (UPDATED)


10 Minutes
Advanced

DSO 304 – Securing API Gateways in a DevSecOps Framework


20 Minutes
Elite

DSO 301 – Orchestrating Secure System and Service Configuration


20 Minutes
Elite

DES 283 – OWASP IoT3: Mitigating Insecure Ecosystem Interfaces


12 Minutes
Advanced

DSO 254 – DevSecOps in the Azure Cloud


20 Minutes
Advanced

DSO 253 – DevSecOps in the AWS Cloud


20 Minutes
Advanced

DES 216 – Protecting Cloud Infrastructure


40 Minutes
Advanced

COD 258 – Creating Secure PHP Web Applications


30 Minutes
Advanced

COD 383 – Protecting Java Backend Services


30 Minutes
Elite

COD 267 – Securing Python Microservices


30 Minutes
Advanced

COD 309 – Securing ASP.NET MVC Applications


30 Minutes
Elite

DES 218 – Protecting Microservices, Containers, and Orchestration


30 Minutes
Advanced

COD 214 – Creating Secure GO Applications


30 Minutes
Advanced

COD 266 – Secure Ruby Scripting


15 Minutes
Advanced

COD 265 – Secure Python Scripting


15 Minutes
Advanced

COD 248 – PCI DSS 6: Develop and Maintain Secure Systems and Applications


15 Minutes
Advanced

ENG 311 – Attack Surface Analysis & Reduction


25 Minutes
Elite

ENG 211 – How to Create Application Security Design Requirements


15 Minutes
Advanced

COD 364 – Securing HTML5 Connectivity


20 Minutes
Elite

COD 363- Securing HTML5 Data


20 Minutes
Elite

COD 318 – Protecting Data on Android in Java


20 Minutes
Elite

COD 317 – Protecting Data on iOS in Swift


20 Minutes
Elite

COD 316 – Creating Secure iOS Code in Objective C


30 Minutes
Elite

COD 307 – Protecting Data in C++


25 Minutes
Elite

COD 301 – Secure C Buffer Overflow Mitigations


45 Minutes
Elite

COD 283 – Java Cryptography


45 Minutes
Advanced

COD 281 – Java Security Model


20 Minutes
Advanced

COD 264 – Secure Perl Scripting


15 Minutes
Advanced

COD 257 – Creating Secure Python Web Applications


45 Minutes
Advanced

COD 216 – Leveraging .NET Framework Code Access Security (CAS)


30 Minutes
Advanced

Security Innovation

  • Training
  • Services
  • Solutions
  • Resources
  • About Us
  • Let’s Talk

Offices

Headquarters – Boston, MA
187 Ballardvale Street, Suite A195
Wilmington, MA 01887

Phone: +1.877.839.7598
Sales: 1.877.839.7598 x1
Support: 1.877.839.7598 x2
Email: Support
Email: PR

Pune, India
516 World Trade Center – Tower 2
Kharadi, Pune, MH 411014
Phone: +91 820 840 1411
Email: India Sales

Seattle, WA
1511 3rd Ave #808
Seattle, WA 98101

Copyright © Security Innovation, Inc. All Rights Reserved

Privacy Policy