• Training
    • AppSec Training
    • Cyber Ranges
    • Skills Assessment
    • Tabletop Exercises
    • Labs
    • Courses
  • Solutions
    • Financial Services
    • Application Security Development
    • Developer Security Training
    • Mobile Application Security
  • For Individuals
  • Plans
  • Resources
  • Company
    • About Us
    • Partners
    • Newsroom
    • Contact Us
    • Careers
  • Blog
  • Free Trial
  • Request Demo
  • Login

 Home/ Course Catalog/ Subject Matter/Cloud

Cloud

Courses

View All Courses
COD 252 – Securing Google Platform Applications & Data
30 Minutes
0.60 CPE
DES 220 – Secure AWS CloudFormation Configuration
25 Minutes
0.50 CPE
DES 216 – Protecting Cloud Infrastructure
20 Minutes
0.4 CPE
DES 206 – Meeting Cloud Governance and Compliance Requirements
20 Minutes
0.40 CPE
COD 245 – Securing NoSQL Cloud Databases
25 Minutes
0.4 CPE
API 351 – Securing Kubernetes in the Build and Release Stages
25 Minutes
0.5 CPE
LAB 278 – Defending C# Applications Against Command Injection
10 Minutes
0.25 CPE
LAB 275 – Defending Java Applications Against Command Injection
10 Minutes
0.25 CPE
LAB 276 – Defending Python Applications Against Command Injection
10 Minutes
0.20 CPE
LAB 277 – Defending Node.js Applications Against Command Injection
10 Minutes
0.25 CPE
LAB 279 – Defending Java Applications Against Dangerous File Upload
10 Minutes
0.25 CPE
LAB 280 – Defending Python Applications Against Dangerous File Upload
10 Minutes
0.25 CPE
LAB 281 – Defending Node.js Applications Against Dangerous File Upload
10 Minutes
0.25 CPE
LAB 283 – Defending Java Applications Against RegEx DoS
10 Minutes
0.25 CPE
LAB 284 – Defending Python Applications Against RegEx DoS
10 Minutes
0.20 CPE
LAB 285 – Defending Node.js Applications Against RegEx DoS
10 Minutes
0.25 CPE
LAB 286 – Defending C# Applications Against RegEx DoS
10 Minutes
0.25 CPE
LAB 282 – Defending C# Applications Against Dangerous File Upload
10 Minutes
0.25 CPE
LAB 137 – Identifying Improper Authorization
5 Minutes
0.25 CPE
LAB 138 – Identifying Authorization Bypass Through User-Controlled Key
5 Minutes
0.25 CPE
LAB 139 – Identifying Use of a Key Past its Expiration Date
5 Minutes
0.25 CPE
LAB 214 – Defending C# Applications Against Credentials in Code Medium
10 Minutes
.25 CPE
LAB 215 – Defending Java Applications Against Business Logic Error for Input Validation
10 Minutes
.25 CPE
LAB 216 – Defending Python Applications Against Business Logic Error for Input Validation
10 Minutes
.25 CPE
LAB 217 – Defending Node.js Applications Against Business Logic Error for Input Validation
10 Minutes
.25 CPE
LAB 218 – Defending C# Applications Against Business Logic Error for Input Validation
10 Minutes
.25 CPE
LAB 224 – Defending Java Applications Against Forceful Browsing
10 Minutes
.25 CPE
LAB 225 – Defending Python Applications Against Forceful Browsing
10 Minutes
.25 CPE
LAB 226 – Defending Node.js Applications Against Forceful Browsing
10 Minutes
.25 CPE
LAB 227 – Defending C# Applications Against Forceful Browsing
10 Minutes
.25 CPE
LAB 133 – Identifying Exposure of Sensitive Information Through Environmental Variables
5 Minutes
0.25 CPE
LAB 134 – Identifying Plaintext Storage of a Password
5 Minutes
0.25 CPE
LAB 135 – Identifying URL Redirection to Untrusted Site
5 Minutes
0.25 CPE
LAB 136 – Identifying Improper Neutralization of Script in Attributes in a Web Page
5 Minutes
0.25 CPE
DES 261 – Securing Serverless Environments
20 Minutes
.5 CPE
LAB 213 – Defending Node.js Applications Against Credentials in Code Medium
10 Minutes
.25 CPE
LAB 212 – Defending Python Applications Against Credentials in Code Medium
10 Minutes
.25 CPE
LAB 211 – Defending Java Applications Against Credentials in Code Medium
10 Minutes
.25 CPE
LAB 132 – Identifying Exposed Services
5 Minutes
0.25 CPE
LAB 131 – Identifying Improper Restriction of XML External Entity Reference
5 Minutes
0.25 CPE
ICS 210 – ICS/SCADA Security Essentials
12 Minutes
.25 CPE
API 250 – Controlling Access to the Kubernetes API
20 Minutes
.5 CPE
DES 314 – Hardening the Docker Engine
15 Minutes
0.25 CPE
DES 313 – Hardening a Kubernetes Cluster
20 Minutes
0.5 CPE
LAB 111 – Identifying Server-Side Request Forgery
5 Minutes
0.25 CPE
LAB 123 – Identifying Vertical Privilege Escalation
5 Minutes
0.25 CPE
LAB 122 – Identifying Insecure APIs
5 Minutes
0.25 CPE
SDT 307 – Testing for Server-Side Request Forgery (SSRF)
10 Minutes
0.25 CPE
DES 238 – Mitigating OWASP 2021 Server-Side Request Forgery (SSRF)
12 Minutes
0.25 CPE
DES 208 – Defending Against the CSA Top 11 Threats to Cloud Computing
15 Minutes
0.25 CPE
TST 305 – Penetration Testing for Azure Cloud
20 Minutes
0.5 CPE
TST 304 – Penetration Testing for AWS Cloud
20 Minutes
0.5 CPE
TST 303 – Penetration Testing for Google Cloud Platform
20 Minutes
0.5 CPE
DSO 256 – DevSecOps in the Google Cloud Platform
20 Minutes
0.5 CPE
DSO 303 – Automating Security Updates
20 Minutes
0.5 CPE
DSO 302 – Automated Security Testing
20 Minutes
0.5 CPE
DSO 305 – Automating CI/CD Pipeline Compliance
20 Minutes
0.5 CPE
DSO 304 – Securing API Gateways in a DevSecOps Framework
20 Minutes
0.5 CPE
DSO 301 – Orchestrating Secure System and Service Configuration
20 Minutes
0.5 CPE
DSO 211 – Identifying Threats to Containers in a DevSecOps Framework
20 Minutes
0.5 CPE
DSO 254 – DevSecOps in the Azure Cloud
20 Minutes
0.5 CPE
DSO 253 – DevSecOps in the AWS Cloud
20 Minutes
0.5 CPE
DES 210 – Hardening Linux/Unix Systems
30 Minutes
0.5 CPE
DES 218 – Protecting Microservices, Containers, and Orchestration
25 Minutes
0.50 CPE
COD 267 – Securing Python Microservices
30 Minutes
0.5 CPE
COD 141 – Fundamentals of Database Security
20 Minutes
0.5 CPE
COD 254 – Creating Secure Azure Applications
45 Minutes
1 CPE
COD 253 – Creating Secure AWS Cloud Applications
45 Minutes
1 CPE
COD 219 – Creating Secure Code: SAP ABAP Foundations
90 Minutes
1.75 CPE
COD 152 – Fundamentals of Secure Cloud Development
20 Minutes
0.5 CPE
security innovation white logo

Trusted since 2002, CMD+CTRL Security delivers mid-size to enterprise-ready software security training through interactive modules, real-world labs, and hands-on cyber ranges.

~
BUILD SKILLS THAT STICK
  • Follow
  • Follow
  • Follow

PRODUCT

AppSec Training

Cyber Range

Skills Assessment

Courses Library

Interactive Labs

SOLUTIONS

Financial Services

AppSec Development

Developer Training

Mobile Security

COMPANY

About Us

Contact Us

Careers

Partners

Security
Trust Center

Stay Secure

Stay informed about the latest developments, upcoming product releases, and insider industry news.

Success!

Subscribe

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Unsubscribe at any time. Read our Privacy Policy.


HQ – Boston Metro
500 Unicorn Park Dr, Suite 300
Woburn, MA 01801

(339) 707-7929

Sales Team
Support Team
Copyright © 2026 CMD+CTRL Security. All Rights Reserved.
Privacy Policy| Cookie Policy