Close
Training
CMD+CTRL Base Camp
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
Pen testing Overview
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Guides & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Ed TALKS
We’re Hiring
Blog
Course Catalog
Ed TALKS
We’re Hiring
Blog
Course Catalog
Training
CMD+CTRL Base Camp
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
Pen testing Overview
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Guides & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Course Catalog
/
NICE Specialty Areas
/
Protect & Defend (PR)
Protect & Defend (PR)
The Courses
View All Courses
Download Course Catalog
LAB 335 ATT&CK: Unsecured Credentials
12 Minutes
Elite
LAB 334 ATT&CK: Create Account
12 Minutes
Elite
LAB 332 ATT&CK: Network Share Discovery
12 Minutes
Elite
LAB 331 ATT&CK: Network Service Discovery
12 Minutes
Elite
API 213 Mitigating APIs Mass Assignment
15 Minutes
Advanced
ICS 310 Protecting Information and System Integrity in Industrial Control System Environments
15 Minutes
Elite
API 214 Mitigating APIs Improper Asset Management
15 Minutes
Advanced
CYB 250 Cyber Threat Hunting: Tactics, Techniques, and Procedures (TTP)
20 Minutes
Elite
DES 314 Hardening the Docker Engine
15 Minutes
Elite
DES 313 Hardening a Kubernetes Cluster (NEW)
20 Minutes
Elite
API 211 Mitigating APIs Broken Object Level Authorization (NEW)
15 Minutes
Advanced
DES 209 Authentication and Lifecycle Management (NEW)
15 Minutes
Advanced
LAB 113 Identifying Cryptographic Failures (NEW)
5 Minutes
Advanced
SDT 310 Testing for Security Logging and Monitoring Failures (NEW)
10 Minutes
Elite
SDT 309 Testing for Vulnerable and Outdated Components (NEW)
10 Minutes
Elite
SDT 308 Testing for Software and Data Integrity Failures (NEW)
10 Minutes
Elite
SDT 307 Testing for Server-Side Request Forgery (SSRF) (NEW)
10 Minutes
Elite
SDT 306 Testing for Security Misconfiguration (NEW)
10 Minutes
Elite
SDT 305 Testing for Broken Access Control (NEW)
10 Minutes
Elite
SDT 304 Testing for Insecure Design (NEW)
10 Minutes
Elite
SDT 303 Testing for Cryptographic Failures (NEW)
10 Minutes
Elite
SDT 302 Testing for Identification and Authentication Failures (NEW)
10 Minutes
Elite
SDT 301 Testing for Injection (NEW)
10 Minutes
Elite
DES 239 Mitigating OWASP 2021 Software and Data Integrity Failures (NEW)
12 Minutes
Advanced
DES 238 Mitigating OWASP 2021 Server-Side Request Forgery (SSRF) (NEW)
12 Minutes
Advanced
DES 234 – Mitigating OWASP 2021 Cryptographic Failures (NEW)
12 Minutes
Advanced
TST 305 – Penetration Testing for Azure Cloud
20 Minutes
Elite
TST 304 – Penetration Testing for AWS Cloud
20 Minutes
Elite
TST 303 – Penetration Testing for Google Cloud Platform
20 Minutes
Elite
DSO 256 – DevSecOps in the Google Cloud Platform
20 Minutes
Advanced
COD 252 – Securing Google Platform Applications & Data
25 Minutes
Advanced
ATK 201 – Using the MITRE ATT&CK Framework
15 Minutes
Advanced
DSO 301 – Orchestrating Secure System and Service Configuration
20 Minutes
Elite
TST 302 – Application Penetration Testing
45 Minutes
Elite
TST 301 – Infrastructure Penetration Testing
45 Minutes
Elite
TST 360 – Penetration Testing for Authentication Vulnerabilities
12 Minutes
Elite
TST 359 – Penetration Testing Network Infrastructure
12 Minutes
Elite
TST 358 – Penetration Testing Wireless Networks
12 Minutes
Elite
TST 357 – Penetration Testing for Hardcoded Secrets
12 Minutes
Elite
TST 356 – Penetration Testing for Cross-Site Scripting (XSS)
12 Minutes
Elite
TST 355 – Penetration Testing for Authorization Vulnerabilities
12 Minutes
Elite
TST 354 – Penetration Testing for Memory Corruption Vulnerabilities
12 Minutes
Elite
TST 353 – Penetration Testing for SQL Injection
12 Minutes
Elite
TST 352 – Penetration Testing for Injection Vulnerabilities
12 Minutes
Elite
TST 351 – Penetration Testing for TLS Vulnerabilities
12 Minutes
Elite
TST 202 – Penetration Testing Fundamentals
25 Minutes
Advanced
ENG 311 – Attack Surface Analysis & Reduction
25 Minutes
Elite
ENG 211 – How to Create Application Security Design Requirements
15 Minutes
Advanced
ENG 118 – Essential Incident Response
15 Minutes
Core