Close
Training
CMD+CTRL Base Camp
NEW!
SI-CSC Certifications
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Guides & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Ed TALKS
We’re Hiring
Blog
Course Catalog
Ed TALKS
We’re Hiring
Blog
Course Catalog
Training
CMD+CTRL Base Camp
NEW!
SI-CSC Certifications
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Guides & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Course Catalog
/
NICE Specialty Areas
/
Securely Provision (SP)
Securely Provision (SP)
The Courses
View All Courses
Download Course Catalog
LAB 211 – Defending Java Applications Against Credentials in Code Medium (NEW)
10 Minutes
Advanced
LAB 212 – Defending Python Applications Against Credentials in Code Medium (NEW)
10 Minutes
Advanced
LAB 213 – Defending Node.js Applications Against Credentials in Code Medium (NEW)
10 Minutes
Advanced
LAB 214 – Defending C# Applications Against Credentials in Code Medium (NEW)
10 Minutes
Advanced
LAB 215 – Defending Java Applications Against Business Logic Error for Input Validation (NEW)
10 Minutes
Advanced
LAB 216 – Defending Python Applications Against Business Logic Error for Input Validation (NEW)
10 Minutes
Advanced
LAB 217 – Defending Node.js Applications Against Business Logic Error for Input Validation (NEW)
10 Minutes
Advanced
LAB 218 – Defending C# Applications Against Business Logic Error for Input Validation (NEW)
10 Minutes
Advanced
LAB 224 – Defending Java Applications Against Forceful Browsing (NEW)
10 Minutes
Advanced
LAB 225 – Defending Python Applications Against Forceful Browsing (NEW)
10 Minutes
Advanced
LAB 226 – Defending Node.js Applications Against Forceful Browsing (NEW)
10 Minutes
Advanced
LAB 227 – Defending C# Applications Against Forceful Browsing (NEW)
10 Minutes
Advanced
DES 219 – Securing Google’s Firebase Platform (NEW)
60 Minutes
Advanced
DES 261 – Securing Serverless Environments (NEW)
20 Minutes
Advanced
LAB 136 – Identifying Improper Neutralization of Script in Attributes in a Web Page (NEW)
5 Minutes
Core
LAB 135 – Identifying URL Redirection to Untrusted Site (NEW)
5 Minutes
Core
LAB 134 – Identifying Plaintext Storage of a Password (NEW)
5 Minutes
Core
LAB 133 – Identifying Exposure of Sensitive Information Through Environmental Variables (NEW)
5 Minutes
Core
LAB 274 – Defending C# Applications Against SSRF
10 Minutes
Advanced
LAB 273 – Defending Node.js Applications Against SSRF
10 Minutes
Advanced
LAB 272 – Defending Python Applications Against SSRF
10 Minutes
Advanced
LAB 271 – Defending Java Applications Against SSRF
10 Minutes
Advanced
LAB 270 – Defending C# Applications Against Deserialization of Untrusted Data
10 Minutes
Advanced
LAB 269 – Defending Node.js Applications Against Deserialization of Untrusted Data
10 Minutes
Advanced
LAB 268 – Defending Python Applications Against Deserialization of Untrusted Data
10 Minutes
Advanced
LAB 267 – Defending Java Applications Against Deserialization of Untrusted Data
10 Minutes
Advanced
LAB 266 – Defending C# Applications Against Sensitive Information in Log Files
10 Minutes
Advanced
LAB 265 – Defending Node.js Applications Against Sensitive Information in Log Files
10 Minutes
Advanced
LAB 264 – Defending Python Applications Against Sensitive Information in Log Files
10 Minutes
Advanced
LAB 263 – Defending Java Applications Against Sensitive Information in Log Files
10 Minutes
Advanced
LAB 132 – Identifying Exposed Services
5 Minutes
Elective
LAB 131 – Identifying Improper Restriction of XML External Entity Reference
5 Minutes
Elective
API 250 – Controlling Access to the Kubernetes API
20 Minutes
Advanced
LAB 262 – Defending Node.js Applications Against Sensitive Information in Error Messages
10 Minutes
Advanced
LAB 261 – Defending Python Applications Against Sensitive Information in Error Messages
10 Minutes
Advanced
LAB 260 – Defending C# Applications Against Sensitive Information in Error Messages
10 Minutes
Advanced
LAB 236 – Defending Java Applications Against Sensitive Information in Error Messages
10 Minutes
Advanced
LAB 130 – Identifying Generation of Predictable Numbers or Identifiers
5 Minutes
Core
LAB 129 – Identifying Error Message Containing Sensitive Information
5 Minutes
Core
LAB 128 – Identifying Unverified Password Change
5 Minutes
Core
LAB 127 – Identifying Security Logging and Monitoring Failures
5 Minutes
Core
API 213 – Mitigating APIs Mass Assignment
15 Minutes
Advanced
ICS 310 – Protecting Information and System Integrity in Industrial Control System Environments
15 Minutes
Elite
API 214 – Mitigating APIs Improper Asset Management
15 Minutes
Advanced
CYB 250 – Cyber Threat Hunting: Tactics, Techniques, and Procedures (TTP)
20 Minutes
Elite
DES 314 – Hardening the Docker Engine
15 Minutes
Elite
LAB 253 – Defending Python Applications Against Weak PRNG
10 Minutes
Advanced
LAB 247 – Defending Node.js Applications Against Weak PRNG
10 Minutes
Advanced
LAB 229 – Defending Java Applications Against Weak PRNG
10 Minutes
Advanced
LAB 239 – Defending C# Applications Against Weak PRNG
10 Minutes
Advanced
LAB 252 – Defending Python Applications Against Weak AES ECB Mode Encryption
10 Minutes
Advanced
LAB 246 – Defending Node.js Applications Against Weak AES ECB Mode Encryption
10 Minutes
Advanced
LAB 228 – Defending Java Applications Against Weak AES ECB Mode Encryption
10 Minutes
Advanced
LAB 238 – Defending C# Applications Against Weak AES ECB Mode Encryption
10 Minutes
Advanced
LAB 249 – Defending Python Applications Against Plaintext Password Storage
10 Minutes
Advanced
LAB 245 – Defending Node.js Applications Against Plaintext Password Storage
10 Minutes
Advanced
LAB 235 – Defending Java Applications Against Plaintext Password Storage
10 Minutes
Advanced
LAB 251 – Defending C# Applications Against Plaintext Password Storage
10 Minutes
Advanced
LAB 254 – Defending Python Applications Against Parameter Tampering
10 Minutes
Advanced
LAB 248 – Defending Node.js Applications Against Parameter Tampering
10 Minutes
Advanced
LAB 234 – Defending Java Applications Against Parameter Tampering
10 Minutes
Advanced
LAB 250 – Defending C# Applications Against Parameter Tampering
10 Minutes
Advanced
LAB 126 – Identifying Information Leakage
5 Minutes
Core
LAB 125 – Identifying Buffer Overflow
5 Minutes
Core
LAB 124 – Identifying Horizontal Privilege Escalation
5 Minutes
Core
LAB 111 – Identifying Server-Side Request Forgery
5 Minutes
Core
DES 313 – Hardening a Kubernetes Cluster
20 Minutes
Elite
API 211 – Mitigating APIs Broken Object Level Authorization
15 Minutes
Advanced
DES 209 – Authentication and Lifecycle Management
15 Minutes
Advanced
LAB 324 ATT&CK: Exploiting Java Web Application Server Misconfiguration
12 Minutes
EliteElective
LAB 323 ATT&CK: Exploiting Vulnerable Java Web Application Server Software
12 Minutes
EliteElective
LAB 315 ATT&CK: Updating Vulnerable Java Web Application Server Software
12 Minutes
EliteElective
LAB 244 – Defending Java Applications Against Security Misconfiguration
12 Minutes
Advanced
LAB 243 – Defending Python Applications Against eXternal XML Entity (XXE) Vulnerabilities
10 Minutes
Advanced
LAB 242 – Defending Node.js Applications Against eXternal XML Entity (XXE) Vulnerabilities
10 Minutes
Advanced
LAB 241 – Defending C# Applications Against eXternal XML Entity (XXE) Vulnerabilities
10 Minutes
Advanced
LAB 240 – Defending Java Applications Against eXternal XML Entity (XXE) Vulnerabilities
10 Minutes
Advanced
LAB 223 – Defending Node.js Applications Against SQL Injection
10 Minutes
Advanced
LAB 222 – Defending Python Applications Against SQL Injection
10 Minutes
Advanced
LAB 221 – Defending C# Applications Against SQL Injection
10 Minutes
Advanced
LAB 123 – Identifying Vertical Privilege Escalation
5 Minutes
AdvancedElective
LAB 122 – Identifying Insecure APIs
5 Minutes
AdvancedElective
LAB 121 – Identifying Vulnerable and Outdate Components
5 Minutes
Advanced
LAB 113 – Identifying Cryptographic Failures
5 Minutes
Advanced
SDT 310 – Testing for Security Logging and Monitoring Failures
10 Minutes
Elite
SDT 309 – Testing for Vulnerable and Outdated Components
10 Minutes
Elite
SDT 308 – Testing for Software and Data Integrity Failures
10 Minutes
Elite
SDT 307 – Testing for Server-Side Request Forgery (SSRF)
10 Minutes
Elite
SDT 306 – Testing for Security Misconfiguration
10 Minutes
Elite
SDT 305 – Testing for Broken Access Control
10 Minutes
Elite
SDT 304 – Testing for Insecure Design
10 Minutes
Elite
SDT 303 – Testing for Cryptographic Failures
10 Minutes
Elite
SDT 302 – Testing for Identification and Authentication Failures
10 Minutes
Elite
SDT 301 – Testing for Injection
10 Minutes
Elite
DES 241 – Mitigating OWASP 2021 Security Logging and Monitoring Failures
12 Minutes
Advanced
DES 240 – Mitigating OWASP 2021 Vulnerable and Outdated Components
12 Minutes
Advanced
DES 239 – Mitigating OWASP 2021 Software and Data Integrity Failures
12 Minutes
Advanced
DES 238 – Mitigating OWASP 2021 Server-Side Request Forgery (SSRF)
12 Minutes
Advanced
DES 237 – Mitigating OWASP 2021 Security Misconfiguration
12 Minutes
Advanced
DES 236 – Mitigating OWASP 2021 Broken Access Control
12 Minutes
Advanced
DES 235 – Mitigating OWASP 2021 Insecure Design
12 Minutes
Advanced
DES 234 – Mitigating OWASP 2021 Cryptographic Failures
12 Minutes
Advanced
DES 233 – Mitigating OWASP 2021 Identification and Authentication Failures
12 Minutes
Advanced
DES 232 – Mitigating OWASP 2021 Injection
12 Minutes
Advanced
LAB 330 ATT&CK: Exploiting Java SQL Injection to Extract Password Hashes
15 Minutes
EliteElective
LAB 322 ATT&CK: Exploiting Windows File Sharing Server with External Remote Services
20 Minutes
EliteElective
LAB 321 ATT&CK: Password Cracking
5 Minutes
EliteElective
LAB 237 – Defending Java Applications Against SQL Injection
20 Minutes
Advanced
LAB 233 – Defending Node.js Applications Against XSS
15 Minutes
Advanced
LAB 232 – Defending C# Applications Against XSS
15 Minutes
Advanced
LAB 231 – Defending Python Applications Against XSS
15 Minutes
Advanced
LAB 230 – Defending Java Applications Against XSS
15 Minutes
Advanced
LAB 220 – Defending Against Hard-Coded Secrets
5 Minutes
Advanced
LAB 120 – Identifying XML Injection
5 Minutes
Core
LAB 119 – Identifying Persistent XSS
5 Minutes
Advanced
LAB 118 – Identifying Weak File Upload Validation
5 Minutes
AdvancedElective
LAB 117 – Identifying Hidden Form Field
5 Minutes
AdvancedElective
LAB 116 – Identifying Forceful Browsing
5 Minutes
AdvancedElective
LAB 115 – Identifying Reflective XSS
5 Minutes
Advanced
LAB 114 – Identifying Cookie Tampering
5 Minutes
AdvancedElective
LAB 110 – Identifying Sensitive Data Exposure Vulnerability Identification
7 Minutes
Advanced
LAB 109 – Identifying Security Misconfiguration Vulnerabilities
5 Minutes
Advanced
LAB 108 – Identifying Reverse Engineering Vulnerabilities
8 Minutes
AdvancedElective
LAB 107 – Identifying Injection Vulnerabilities
7 Minutes
Advanced
LAB 106 – Identifying Cross-Site Scripting Vulnerabilities
7 Minutes
Advanced
LAB 105 – Identifying Credential Dumping: Vulnerability Identification
7 Minutes
AdvancedElective
LAB 104 – Identifying Business Logic Flaw Vulnerabilities
7 Minutes
AdvancedElective
LAB 103 – Identifying Broken User Authentication Vulnerabilities
7 Minutes
Advanced
LAB 102 – Identifying Broken Object-Level Authorization Vulnerabilities
5 Minutes
AdvancedElective
LAB 101 – Identifying Broken Access Control Vulnerabilities
5 Minutes
Advanced
DES 217 – Securing Terraform Infrastructure and Resources
20 Minutes
Advanced
DES 208 – Defending Against the CSA Top 11 Threats to Cloud Computing
15 Minutes
Advanced
DES 207 – Mitigating OWASP API Security Top 10
15 Minutes
Advanced
DSO 256 – DevSecOps in the Google Cloud Platform
20 Minutes
Advanced
SDT 325 – Testing for NULL Pointer Dereference
10 Minutes
Elite
SDT 324 – Testing for Improper Restriction of Operations within the Bounds of a Memory Buffer
10 Minutes
Elite
SDT 322 – Testing for Improper Privilege Management
10 Minutes
Elite
SDT 321 – Testing for Uncontrolled Resource Consumption
10 Minutes
Elite
SDT 320 – Testing for Out-of-bounds Write
10 Minutes
Elite
SDT 319 – Testing for Out-of-bounds Read
10 Minutes
Elite
SDT 318 – Testing for Insufficiently Protected Credentials
10 Minutes
Elite
SDT 317 – Testing for Improper Control of Generation of Code
10 Minutes
Elite
CYB 301 – Fundamentals of Ethical Hacking
15 Minutes
Elite
SDT 326 – Testing for Use After Free
10 Minutes
Elite
COD 386 – Preventing Integer Overflows in Java Code
8 Minutes
Elite
COD 385 – Preventing Race Conditions in Java Code
8 Minutes
Elite
COD 384 – Protecting Java from Information Disclosure
8 Minutes
Elite
COD 324 – Protecting C# from XML Injection
8 Minutes
Elite
COD 319 – Preventing Vulnerabilities in Android Code in Java
20 Minutes
Elite
COD 315 – Preventing Vulnerabilities in iOS Code in Swift
20 Minutes
Elite
ENG 212 – Implementing Secure Software Operations
20 Minutes
Advanced
DSO 306 – Implementing Infrastructure as Code
20 Minutes
Elite
DES 312 – Protecting Cardholder Data
20 Minutes
Elite
COD 366 – Creating Secure Kotlin Applications
20 Minutes
Elite
DSO 307 – Secure Secrets Management
20 Minutes
Advanced
COD 286 – Creating Secure React User Interfaces
10 Minutes
Advanced
COD 285 – Developing Secure Angular Applications
30 Minutes
Advanced
DSO 304 – Securing API Gateways in a DevSecOps Framework
20 Minutes
Elite
DSO 302 – Automated Security Testing
20 Minutes
Elite
DES 282 – OWASP IoT2: Mitigating Insecure Network Services
12 Minutes
Advanced
DES 271 – OWASP M1: Mitigating Improper Platform Usage
12 Minutes
Advanced
DES 272 – OWASP M2: Mitigating Insecure Data Storage
12 Minutes
Advanced
DES 273 – OWASP M3: Mitigating Insecure Communication
12 Minutes
Advanced
DES 274 – OWASP M4: Mitigating Insecure Authentication
12 Minutes
Advanced
DES 275 – OWASP M5: Mitigating Insufficient Cryptography
12 Minutes
Advanced
DES 277 – OWASP M7: Mitigating Client Code Quality
12 Minutes
Advanced
DES 278 – OWASP M8: Mitigating Code Tampering
12 Minutes
Advanced
DES 279 – OWASP M9: Mitigating Reverse Engineering
12 Minutes
Advanced
DES 280 – OWASP M10: Mitigating Extraneous Functionality
12 Minutes
Advanced
DES 281 – OWASP IoT1: Mitigating Weak, Guessable or Hardcoded Passwords
12 Minutes
Advanced
DES 283 – OWASP IoT3: Mitigating Insecure Ecosystem Interfaces
12 Minutes
Advanced
DES 284 – OWASP IoT4: Mitigating Lack of Secure Update Mechanism
12 Minutes
Advanced
DES 285 – OWASP IoT5: Mitigating Use of Insecure or Outdated Components
12 Minutes
Advanced
DES 286 – OWASP IoT6: Mitigating Insufficient Privacy Protection
12 Minutes
Advanced
DES 287 – OWASP IoT7: Mitigating Insecure Data Transfer and Storage
12 Minutes
Advanced
DES 288 – OWASP IoT8: Mitigating Lack of Device Management
12 Minutes
Advanced
DES 289 – OWASP IoT9: Mitigating Insecure Default Settings
12 Minutes
Advanced
DES 276 – OWASP M6: Mitigating Insecure Authorization
12 Minutes
Advanced
DES 290 – OWASP IoT10 Mitigating Lack of Physical Hardening
12 Minutes
Advanced
ENG 354 – Authorizing and Monitoring System Controls within the RMF
20 Minutes
Elite
ENG 353 – Selecting, Implementing and Assessing Controls within the RMF
20 Minutes
Elite
ENG 352 – Categorizing Systems and Information within the RMF
10 Minutes
Elite
DSO 254 – DevSecOps in the Azure Cloud
20 Minutes
Advanced
DSO 253 – DevSecOps in the AWS Cloud
20 Minutes
Advanced
DES 306 – Creating a Secure Blockchain Network
20 Minutes
Elite
DES 255 – Securing the IoT Update Process
30 Minutes
Advanced
COD 258 – Creating Secure PHP Web Applications
30 Minutes
Advanced
COD 251 – Defending AJAX-Enabled Web Applications
25 Minutes
Elective
TST 205 – Performing Vulnerability Scans
45 Minutes
Advanced
ENG 351 – Preparing the Risk Management Framework
20 Minutes
Elite
ENG 251 – Risk Management Foundations
20 Minutes
Advanced
COD 383 – Protecting Java Backend Services
30 Minutes
Elite
COD 267 – Securing Python Microservices
30 Minutes
Advanced
COD 309 – Securing ASP.NET MVC Applications
30 Minutes
Elite
COD 308 – Common ASP.NET MVC Vulnerabilities and Attacks
45 Minutes
Elite
COD 214 – Creating Secure GO Applications
30 Minutes
Advanced
ENG 150 – Meeting Confidentiality, Integrity, and Availability
30 Minutes
Core
COD 284 – Secure Java Coding
30 Minutes
Advanced
COD 266 – Secure Ruby Scripting
15 Minutes
Advanced
COD 265 – Secure Python Scripting
15 Minutes
Advanced
COD 249 – PCI DSS Requirement 11: Regularly Test Security Systems and Processes (UPDATED)
15 Minutes
Advanced
COD 248 – PCI DSS Requirement 6: Develop and Maintain Secure Systems and Applications (UPDATED)
15 Minutes
Advanced
COD 247 – PCI DSS Requirement 4: Encrypting Transmission of Cardholder Data (UPDATED)
15 Minutes
Advanced
COD 246 – PCI DSS Requirement 3: Protecting Stored Cardholder Data (UPDATED)
20 Minutes
Advanced
COD 108 – Software Operations and Maintenance
10 Minutes
Core
COD 107 – Secure Software Deployment
10 Minutes
Core
COD 106 – The Importance of Software Integration and Testing
15 Minutes
Core
COD 105 – Secure Software Development
20 Minutes
Core
COD 104 – Designing Secure Software
15 Minutes
Core
COD 103 – Creating Software Security Requirements
10 Minutes
Core
COD 102 – The Role of Software Security
10 Minutes
Core
SDT 311 – Testing for Integer Overflow or Wraparound
15 Minutes
Elite
SDT 315 – Testing for Incorrect Permission Assignment for Critical Resource
15 Minutes
Elite
SDT 312 – Testing for (Path Traversal) Improper Limitation of a Pathname to a Restricted Directory
15 Minutes
Elite
SDT 313 – Testing for (CSRF) Cross Site Request Forgery
15 Minutes
Elite
SDT 314 – Testing for Unrestricted Upload of File with Dangerous Type
15 Minutes
Elite
SDT 316 – Testing for Use of Hard-Coded Credentials
15 Minutes
Elite
TST 101 – Fundamentals of Security Testing
20 Minutes
Core
ENG 312 – How to Perform a Security Code Review
30 Minutes
Elite
ENG 205 – Fundamentals of Threat Modeling
45 Minutes
Advanced
ENG 195 – Implementing the Microsoft SDL Threat Modeling Tool
20 Minutes
Core
ENG 194 – Implementing Microsoft SDL Line of Business
20 Minutes
Core
ENG 193 – Implementing the Microsoft SDL Optimization Model
12 Minutes
Core
ENG 192 – Implementing the Agile Microsoft SDL
20 Minutes
Core
ENG 191 – Introduction to the Microsoft SDL
25 Minutes
Core
ENG 126 – Essential Security Maintenance Policies
15 Minutes
Core
ENG 124 – Essential Application Protection
15 Minutes
Core
ENG 123 – Essential Security Engineering Principles
15 Minutes
Core
ENG 120 – Essential Security Assessment & Authorization
15 Minutes
Core
ENG 117 – Essential Information Security Program Planning
15 Minutes
Core
ENG 116 – Essential Security Planning Policy & Procedures
15 Minutes
Core
ENG 115 – Essential System & Information Integrity
15 Minutes
Core
ENG 114 – Essential Risk Assessment
15 Minutes
Core
DES 311 – Creating Secure Application Architecture
45 Minutes
Elite
DES 260 – Fundamentals of IoT Architecture & Design
30 Minutes
Advanced
DES 212 – Architecture Risk Analysis & Remediation
30 Minutes
Advanced
DES 205 – Message Integrity Cryptographic Functions
45 Minutes
Advanced
DES 204 – Role of Cryptography in Application Development
15 Minutes
Advanced
DES 203 – Cryptographic Components: Randomness, Algorithms, and Key Management
15 Minutes
Advanced
DES 202 – Cryptographic Suite Services: Encoding, Encrypting & Hashing
45 Minutes
Advanced
DES 101 – Fundamentals of Secure Architecture
20 Minutes
Core
COD 382 – Protecting Data in Java
30 Minutes
Elite
COD 381 – Preventing Path Traversal Attacks in Java
8 Minutes
Elite
COD 380 – Preventing SQL Injection in Java
8 Minutes
Elite
COD 364 – Securing HTML5 Connectivity
20 Minutes
Elite
COD 363 – Securing HTML5 Data
20 Minutes
Elite
COD 362 – HTML5 Built in Security Features
20 Minutes
Elite
COD 361 – HTML5 Secure Threats
15 Minutes
Elite
COD 352 – Creating Secure JavaScript and jQuery Code
45 Minutes
Elite
COD 323 – Using Encryption with C#
20 Minutes
Elite
COD 322 – Protecting C# from SQL Injection
8 Minutes
Elite
COD 321 – Protecting C# from Integer Overflows & Canonicalization
30 Minutes
Elite
COD 318 – Protecting Data on Android in Java
20 Minutes
Elite
COD 317 – Protecting Data on iOS in Swift
20 Minutes
Elite
COD 316 – Creating Secure iOS Code in Objective C
30 Minutes
Elite
COD 307 – Protecting Data in C++
25 Minutes
Elite
COD 303 – Common C Vulnerabilities & Attacks
20 Minutes
Elite
COD 302 – Secure C Memory Management
20 Minutes
Elite
COD 301 – Secure C Buffer Overflow Mitigations
45 Minutes
Elite
COD 283 – Java Cryptography
45 Minutes
Advanced
COD 281 – Java Security Model
20 Minutes
Advanced
COD 270 – Creating Secure COBOL & Mainframe Applications
25 Minutes
Advanced
COD 264 – Secure Perl Scripting
15 Minutes
Advanced
COD 263 – Secure Bash Scripting
15 Minutes
Advanced
COD 262 – Fundamentals of Shell and Interpreted Language Security
30 Minutes
Advanced
COD 261 – Threats to Scripts
30 Minutes
Advanced
COD 259 – Node.js Threats & Vulnerabilities
30 Minutes
Advanced
COD 257 – Creating Secure Python Web Applications
45 Minutes
Advanced
COD 256 – Creating Secure Code: Ruby on Rails Foundations
90 Minutes
Elective
COD 255 – Creating Secure Code: Web API Foundations
20 Minutes
Elective
COD 254 – Creating Secure Azure Applications
45 Minutes
Advanced
COD 253 – Creating Secure AWS Cloud Applications
45 Minutes
Advanced
COD 242 – Creating Secure SQL Server & Azure SQL DB Applications
40 Minutes
Advanced
COD 241 – Creating Secure Oracle DB Applications
45 Minutes
Advanced
COD 219 – Creating Secure Code: SAP ABAP Foundations
90 Minutes
Advanced
COD 217 – Mitigating .NET Security Threats
45 Minutes
Advanced
COD 216 – Leveraging .NET Framework Code Access Security (CAS)
60 Minutes
Advanced
COD 207 – Communication Security in C++
15 Minutes
Advanced
COD 206 – Creating Secure C++ Code
15 Minutes
Advanced
COD 202 – Secure C Runtime Protection
15 Minutes
Advanced
COD 201 – Secure C Encrypted Network Communications
15 Minutes
Advanced
COD 170 – Identifying Threats to Mainframe COBOL Applications & Data
20 Minutes
Core
COD 160 – Fundamentals of Secure Embedded Software Development
45 Minutes
Core
COD 152 – Fundamentals of Secure Cloud Development
20 Minutes
Core
COD 110 – Fundamentals of Secure Mobile Development
45 Minutes
Core
AWA 101 – Fundamentals of Application Security (UPDATED)
20 Minutes
Core