Close
Training
CMD+CTRL Base Camp
NEW!
SI-CSC Certifications
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
Pen testing Overview
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Guides & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Ed TALKS
We’re Hiring
Blog
Course Catalog
Ed TALKS
We’re Hiring
Blog
Course Catalog
Training
CMD+CTRL Base Camp
NEW!
SI-CSC Certifications
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
Pen testing Overview
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Guides & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Course Catalog
/
Subject
/
C#
C#
View All Courses
Download Course Catalog
LAB 274 – Defending C# Applications Against SSRF (NEW)
10 Minutes
Advanced
LAB 270 – Defending C# Applications Against Deserialization of Untrusted Data (NEW)
10 Minutes
Advanced
LAB 266 – Defending C# Applications Against Sensitive Information in Log Files (NEW)
10 Minutes
Advanced
LAB 260 – Defending C# Applications Against Sensitive Information in Error Messages
10 Minutes
Advanced
LAB 239 – Defending C# Applications Against Weak PRNG
10 Minutes
Advanced
LAB 238 – Defending C# Applications Against Weak AES ECB Mode Encryption
10 Minutes
Advanced
LAB 251 – Defending C# Applications Against Plaintext Password Storage
10 Minutes
Advanced
LAB 250 – Defending C# Applications Against Parameter Tampering
10 Minutes
Advanced
LAB 241 – Defending C# Applications Against eXternal XML Entity (XXE) Vulnerabilities
10 Minutes
Advanced
LAB 221 – Defending C# Applications Against SQL Injection
10 Minutes
Advanced
LAB 232 – Defending C# Applications Against XSS
15 Minutes
Advanced
COD 324 – Protecting C# from XML Injection
8 Minutes
Elite
SDT 314 – Testing for Unrestricted Upload of File with Dangerous Type
15 Minutes
Elite
COD 323 – Using Encryption with C#
20 Minutes
Elite
COD 322 – Protecting C# from SQL Injection
8 Minutes
Elite
COD 321 – Protecting C# from Integer Overflows & Canonicalization
30 Minutes
Elite