Close
Training
CMD+CTRL Base Camp
SI-CSC Certification
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Ed TALKS
White Papers, Tipsheets, & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Request a Demo
We’re Hiring
Blog
Course Catalog
Request a Demo
We’re Hiring
Blog
Course Catalog
Training
CMD+CTRL Base Camp
SI-CSC Certification
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Ed TALKS
White Papers, Tipsheets, & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Course Catalog
/
Subject
/
C#
C#
View All Courses
Download Course Catalog
COD 321 – Protecting C# from Integer Overflows & Canonicalization
30 Minutes
Elite
COD 322 – Protecting C# from SQL Injection
8 Minutes
Elite
COD 323 – Using Encryption with C#
20 Minutes
Elite
COD 324 – Protecting C# from XML Injection
8 Minutes
Elite
LAB 214 – Defending C# Applications Against Credentials in Code Medium
10 Minutes
Advanced
LAB 218 – Defending C# Applications Against Business Logic Error for Input Validation
10 Minutes
Advanced
LAB 221 – Defending C# Applications Against SQL Injection
10 Minutes
Advanced
LAB 227 – Defending C# Applications Against Forceful Browsing
10 Minutes
Advanced
LAB 232 – Defending C# Applications Against XSS
15 Minutes
Advanced
LAB 238 – Defending C# Applications Against Weak AES ECB Mode Encryption
10 Minutes
Advanced
LAB 239 – Defending C# Applications Against Weak PRNG
10 Minutes
Advanced
LAB 241 – Defending C# Applications Against eXternal XML Entity (XXE) Vulnerabilities
10 Minutes
Advanced
LAB 250 – Defending C# Applications Against Parameter Tampering
10 Minutes
Advanced
LAB 251 – Defending C# Applications Against Plaintext Password Storage
10 Minutes
Advanced
LAB 260 – Defending C# Applications Against Sensitive Information in Error Messages
10 Minutes
Advanced
LAB 266 – Defending C# Applications Against Sensitive Information in Log Files
10 Minutes
Advanced
LAB 270 – Defending C# Applications Against Deserialization of Untrusted Data
10 Minutes
Advanced
LAB 274 – Defending C# Applications Against SSRF
10 Minutes
Advanced
LAB 278 – Defending C# Applications Against Command Injection (NEW)
10 Minutes
Advanced
LAB 282 – Defending C# Applications Against Dangerous File Upload (NEW)
10 Minutes
Advanced
LAB 286 – Defending C# Applications Against RegEx DoS (NEW)
10 Minutes
Advanced
SDT 314 – Testing for Unrestricted Upload of File with Dangerous Type
15 Minutes
Elite