Close
Training
CMD+CTRL Base Camp
SI-CSC Certification
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Ed TALKS
White Papers, Tipsheets, & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Request a Demo
We’re Hiring
Blog
Course Catalog
Request a Demo
We’re Hiring
Blog
Course Catalog
Training
CMD+CTRL Base Camp
SI-CSC Certification
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Ed TALKS
White Papers, Tipsheets, & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Course Catalog
/
Subject
/
Node.js
Node.js
View All Courses
Download Course Catalog
COD 259 – Node.js Threats & Vulnerabilities
30 Minutes
Advanced
COD 261 – Threats to Scripts
30 Minutes
Advanced
COD 262 – Fundamentals of Shell and Interpreted Language Security
30 Minutes
Advanced
COD 383 – Protecting Java Backend Services (UPDATED)
30 Minutes
Elite
DES 219 – Securing Google’s Firebase Platform
60 Minutes
Advanced
LAB 213 – Defending Node.js Applications Against Credentials in Code Medium
10 Minutes
Advanced
LAB 217 – Defending Node.js Applications Against Business Logic Error for Input Validation
10 Minutes
Advanced
LAB 223 – Defending Node.js Applications Against SQL Injection
10 Minutes
Advanced
LAB 226 – Defending Node.js Applications Against Forceful Browsing
10 Minutes
Advanced
LAB 233 – Defending Node.js Applications Against XSS
15 Minutes
Advanced
LAB 242 – Defending Node.js Applications Against eXternal XML Entity (XXE) Vulnerabilities
10 Minutes
Advanced
LAB 245 – Defending Node.js Applications Against Plaintext Password Storage
10 Minutes
Advanced
LAB 246 – Defending Node.js Applications Against Weak AES ECB Mode Encryption
10 Minutes
Advanced
LAB 247 – Defending Node.js Applications Against Weak PRNG
10 Minutes
Advanced
LAB 248 – Defending Node.js Applications Against Parameter Tampering
10 Minutes
Advanced
LAB 262 – Defending Node.js Applications Against Sensitive Information in Error Messages
10 Minutes
Advanced
LAB 265 – Defending Node.js Applications Against Sensitive Information in Log Files
10 Minutes
Advanced
LAB 269 – Defending Node.js Applications Against Deserialization of Untrusted Data
10 Minutes
Advanced
LAB 273 – Defending Node.js Applications Against SSRF
10 Minutes
Advanced
LAB 277 – Defending Node.js Applications Against Command Injection (NEW)
10 Minutes
Advanced
LAB 281 – Defending Node.js Applications Against Dangerous File Upload (NEW)
10 Minutes
Advanced
LAB 285 – Defending Node.js Applications Against RegEx DoS (NEW)
10 Minutes
Advanced