• Close
  • Training
    • CMD+CTRL Base Camp
    • Courses
      • Overview
      • Features
      • Learning Paths
      • Course Catalog
      • Customer Success
      • Try it
    • Labs
    • Cyber Range
      • Overview
      • Features
      • Reporting
      • Suite
      • Modes
      • Customer Success
      • Get Started
    • ✓ Take the AppSec Challenge
  • Services
    • Overview
    • Software Penetration Testing
      • Pen testing Overview
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
      • Medical Device Threat Modeling
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Solutions
    • Cloud & Web
    • Mobile
    • IoT & Embedded
    • Blockchain
  • Resources
    • Guides & Case Studies
    • Webinars
  • Blog
  • About
    • Company Overview
    • Ed TALKS
    • Partners
    • Community
    • Clients
    • Leadership
    • Careers
    • News
    • Contact
  • Let’s Talk
  •  
Security Innovation
  • Training
    • CMD+CTRL Base Camp
    • Courses
      • Overview
      • Features
      • Learning Paths
      • Course Catalog
      • Customer Success
      • Try it
    • Labs
    • Cyber Range
      • Overview
      • Features
      • Reporting
      • Suite
      • Modes
      • Customer Success
      • Get Started
    • ✓ Take the AppSec Challenge
  • Services
    • Overview
    • Software Penetration Testing
      • Pen testing Overview
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
      • Medical Device Threat Modeling
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Solutions
    • Cloud & Web
    • Mobile
    • IoT & Embedded
    • Blockchain
  • Resources
    • Guides & Case Studies
    • Webinars
  • Blog
  • About
    • Company Overview
    • Ed TALKS
    • Partners
    • Community
    • Clients
    • Leadership
    • Careers
    • News
    • Contact
  • Let’s Talk
  •  

Course Catalog / NICE Specialty Areas / Exploitation Analysis (EXP)

Exploitation Analysis (EXP)

Analyzes information to identify vulnerabilities and potential for exploitation.


The Courses

View All Courses     Download Course Catalog

DES 239 Mitigating OWASP 2021 Software and Data Integrity Failures (NEW)


12 Minutes
Advanced

TST 305 – Penetration Testing for Azure Cloud


20 Minutes
Elite

TST 304 – Penetration Testing for AWS Cloud


20 Minutes
Elite

TST 303 – Penetration Testing for Google Cloud Platform


20 Minutes
Elite

DSO 211 – Identifying Threats to Containers in a DevSecOps Framework


20 Minutes
Advanced

Security Innovation

  • Training
  • Services
  • Solutions
  • Resources
  • Blog
  • About
  • Let’s Talk

Offices

Headquarters - Boston, MA
187 Ballardvale Street, Suite A195
Wilmington, MA 01887

Phone: +1.877.839.7598
Sales: 1.877.839.7598 x1
Support: 1.877.839.7598 x2
Email: Support
Email: PR

Pune, India
516 World Trade Center - Tower 2
Kharadi, Pune, MH 411014
Phone: +91 820 840 1411
Email: India Sales

Seattle, WA
1511 3rd Ave #808
Seattle, WA 98101

Copyright © 2022 Security Innovation, Inc. All Rights Reserved Privacy Policy