• Training
    • AppSec Training
    • Cyber Ranges
    • Skills Assessment
    • Labs
    • Courses
  • Solutions
    • Financial Services
    • Application Security Development
    • Developer Security Training
    • Mobile Application Security
  • Plans
  • Resources
  • Company
    • About Us
    • Partners
    • Newsroom
    • Contact Us
    • Careers
  • Blog
  • Request Demo
  • Login

 Home/ Course Catalog/ Subject Matter/Standard

Standard

Courses

View All Courses
COD 252 – Securing Google Platform Applications & Data (NEW)
30 Minutes
0.60 CPE
DES 220 – Secure AWS CloudFormation Configuration (NEW)
25 Minutes
0.50 CPE
API 210 – Protecting APIs from Unrestricted Resource Consumption (UPDATED)
15 Minutes
0.3 CPE
API 211 – Protecting APIs Broken Object Level Authorization (UPDATED)
15 Minutes
0.3 CPE
API 213 – Protecting APIs from Broken Object Property Level Authorization (UPDATED)
15 Minutes
0.3 CPE
API 214 – Protecting APIs Improper Asset Management (UPDATED)
15 Minutes
0.3 CPE
DES 215 – Defending the Infrastructure (UPDATED)
25 Minutes
0.5 CPE
DES 216 – Protecting Cloud Infrastructure (UPDATED)
20 Minutes
0.4 CPE
ENG 211 – How to Create Application Security Design Requirements (UPDATED)
25 Minutes
0.5 CPE
LAB 376 – Defending Node.js AI Applications from Prompt Injection
15 Minutes
.30 CPE
LAB 377 – Defending Node.js AI Applications from Improper Output Handling
15 Minutes
.30 CPE
LAB 378 – Defending Node.js AI Applications from System Prompt Leakage
15 Minutes
.30 CPE
LAB 379 – Defending Node.js AI Applications from Misinformation
15 Minutes
.30 CPE
LAB 380 – Defending Node.js AI Applications from Unbounded Consumption
15 Minutes
.30 CPE
DES 200 – Fundamentals of Cryptography, Key Management and Digital Certificates
35 Minutes
.70 CPE
DES 201 – Securing Applications and their Data with Cryptography
25 Minutes
.50 CPE
COD 261 – Threats to Scripts
25 Minutes
0.50 CPE
TST 101 – Fundamentals of Security Testing
15 Minutes
0.30 CPE
ENG 151 – Fundamentals of Privacy Protection
20 Minutes
0.40 CPE
DES 206 – Meeting Cloud Governance and Compliance Requirements
20 Minutes
0.40 CPE
ATK 201 – Using the MITRE ATT&CK Framework
20 Minutes
0.40 CPE
CYB 350 – AI Driven Incident Analysis Techniques
20 Minutes
0.40 CPE
ENG 118 – Essential Cyber Incident Response Planning
15 Minutes
0.30 CPE
LAB 646 – Response: Detecting a JSP Backdoor
15 Minutes
0.30 CPE
LAB 647 – Response: Investigating an Antimalware Alert
15 Minutes
0.30 CPE
LAB 648 – Response: Detecting a Malicious Windows Scheduled Task
15 Minutes
0.30 CPE
LAB 372 – Defending Python AI Applications from System Prompt Leakage
5 Minutes
0.1 CPE
LAB 373 – Defending Python AI Applications from Vector and Embedding Weaknesses
5 Minutes
0.1 CPE
LAB 369 – Defending Python AI Applications from Data and Model Poisoning
5 Minutes
0.1 CPE
LAB 367 – Defending Python AI Applications from Sensitive Information Disclosure
5 Minutes
0.1 CPE
LAB 366 – Defending Python AI Applications from Prompt Injection
5 Minutes
0.1 CPE
LAB 374 – Defending Python AI Applications from Misinformation
5 Minutes
0.1 CPE
LAB 375 – Defending Python AI Applications from Unbounded Consumption
5 Minutes
0.1 CPE
LAB 370 – Defending Python AI Applications from Improper Output Handling
5 Minutes
0.1 CPE
LAB 371 – Defending Python AI Applications from Excessive Agency
5 Minutes
0.1 CPE
LAB 368 – Defending Python AI Applications from Supply Chain Compromise
5 Minutes
0.1 CPE
LAB 644 – Response: Detecting Malware in the Windows Startup Folder
5 Minutes
0.1 CPE
LAB 645 – Response: Detecting Malware in the Registry Run Keys
5 Minutes
0.1 CPE
LAB 643 – Response: Detecting a Malicious Windows Service
5 Minutes
0.1 CPE
CYB 251 – Securing the AI/ML Infrastructure
20 Minutes
0.4 CPE
COD 245 – Securing NoSQL Cloud Databases
25 Minutes
0.4 CPE
COD 289 – Securing Java Applications with Spring Security
25 Minutes
0.5 CPE
AWA 106 – Building Secure Software: Challenges in Application Security
5 Minutes
0.1 CPE
AWA 107 – Building Secure Software: Foundations & Best Practices
15 Minutes
0.3 CPE
AWA 108 – Building Secure Software: A Guide to Software Integration, Testing, and Deployment
20 Minutes
0.4 CPE
LAB 356 – Defending Python APIs from Broken Object Level Authorization
15 Minutes
0.3 CPE
LAB 357 – Defending Python APIs from Broken Authentication
15 Minutes
0.3 CPE
LAB 358 – Defending Python APIs from Broken Object Property Level Authorization
15 Minutes
0.3 CPE
LAB 359 – Defending Python APIs from Unrestricted Resource Consumption
15 Minutes
0.3 CPE
LAB 360 – Defending Python APIs from Broken Function Level Authorization
15 Minutes
0.3 CPE
LAB 361 – Defending Python APIs from Unrestricted Access to Sensitive Business Flows
15 Minutes
0.3 CPE
LAB 362 – Defending Python APIs from Server Side Request Forgery
15 Minutes
0.3 CPE
LAB 363 – Defending Python APIs from Security Misconfiguration
15 Minutes
0.3 CPE
LAB 364 – Defending Python APIs from Improper Inventory Management
15 Minutes
0.3 CPE
LAB 365 – Defending Python APIs from Unsafe Consumption of APIs
15 Minutes
0.3 CPE
LAB 640 – ATT&CK: Search Victim-Owned Websites
10 Minutes
0.2 CPE
LAB 641 – ATT&CK: Password Policy Discovery
10 Minutes
0.2 CPE
LAB 642 – ATT&CK: Permission Groups Discovery
10 Minutes
0.2 CPE
LAB 351 – Defending TypeScript Applications Against Cross-Site Scripting
15 Minutes
0.3 CPE
LAB 348 – Defending C++ Applications Against Null Pointer Dereference
15 Minutes
0.3 CPE
LAB 355 – Defending C Applications Against Stack-based Buffer Overflow
15 Minutes
0.3 CPE
LAB 638 – Using Mimikatz
15 Minutes
0.3 CPE
LAB 639 – Using an Exploit Framework via Command Line Interface
15 Minutes
0.3 CPE
LAB 353 – Defending TypeScript Applications Against Improper Authentication
15 Minutes
0.3 CPE
LAB 354 – Defending Go Applications Against Improper Authentication
15 Minutes
0.3 CPE
LAB 350 – Defending Go Applications Against SQL Injection
15 Minutes
0.3 CPE
LAB 352 – Defending Go Applications Against Cross-Site Scripting
15 Minutes
0.3 CPE
DES 270 – Mitigating OWASP Mobile Top 10 Risks
30 Minutes
0.6 CPE
LAB 349 – Defending TypeScript Applications Against SQL Injection
15 Minutes
0.3 CPE
COD 325 – Protecting Data in C# for .NET Core
30 Minutes
0.6 CPE
COD 310 – Securing ASP.NET Core Applications
20 Minutes
0.4 CPE
LAB 633 – Using an Exploit Framework for Web Application Scanning
30 Minutes
0.6 CPE
DES 250 – Secure Software Acceptance and Deployment
25 Minutes
0.5 CPE
LAB 340 – Defending C Applications Against Use After Free
15 Minutes
0.3 CPE
LAB 341 – Defending C++ Applications Against Use After Free
15 Minutes
0.3 CPE
LAB 347 – Defending C Applications Against Null Pointer Dereference
15 Minutes
0.3 CPE
LAB 329 – Defending Go Applications Against SSRF
15 Minutes
0.3 CPE
LAB 333 – Defending Go Applications Against Hard-coded Credentials
15 Minutes
0.3 CPE
LAB 338 – Defending Go Applications Against CSRF
15 Minutes
0.3 CPE
LAB 339 – Defending Go Applications Against Path Traversal
15 Minutes
0.3 CPE
LAB 342 – Defending TypeScript Applications Against Command Injection
15 Minutes
0.3 CPE
LAB 343 – Defending Go Applications Against Command Injection
15 Minutes
0.3 CPE
LAB 344 – Defending TypeScript Applications Against Incorrect Authorization
15 Minutes
0.3 CPE
LAB 345 – Defending Go Applications Against Incorrect Authorization
15 Minutes
0.3 CPE
LAB 346 – Defending TypeScript Applications Against Deserialization of Untrusted
15 Minutes
0.3 CPE
LAB 626 – Using an Exploit Framework for SQL Injection
30 Minutes
0.6 CPE
LAB 627 – Using an Exploit Framework for Port Scanning
15 Minutes
0.3 CPE
LAB 628 – Using an Exploit Framework for SMB Version Scanning
15 Minutes
0.3 CPE
LAB 629 – Using an Exploit Framework for SNMP Scanning
15 Minutes
0.3 CPE
API 351 – Securing Kubernetes in the Build and Release Stages
25 Minutes
0.5 CPE
LAB 327 – Defending C Applications Against Path Traversal
5 Minutes
.25 CPE
LAB 328 – Defending C++ Applications Against Path Traversal
5 Minutes
.25 CPE
LAB 616 – ATT&CK: Host Vulnerability Scanning
15 Minutes
.25 CPE
LAB 620 – ATT&CK: Advanced Exploit of Remote Services
30 Minutes
.25 CPE
LAB 625 – ATT&CK: Advanced Exploit of Public-Facing Application
30 Minutes
.25 CPE
COD 268 – Mitigating TypeScript Application Vulnerabilities
30 Minutes
.5 CPE
DES 364 – Mitigating Low-Code/No-Code Authentication and Secure Communication Failures
20 Minutes
.5 CPE
COD 304 – Principles of C++ Memory Safety
25 Minutes
.5 CPE
COD 305 – C++ Secure Memory Management
30 Minutes
.5 CPE
COD 306 – C++ Memory Safety: Debugging Tools and Techniques
20 Minutes
.5 CPE
security innovation white logo
Trusted since 2002, CMD+CTRL delivers mid-size to enterprise-ready software security training through interactive modules, real-world labs, and hands-on cyber ranges.

Training & Product

AppSec Training

Cyber Range

Skills Assessment

Courses

Labs

Solutions

Financial Services

Application Security Development

Developer Security Training

Mobile Application Security

About Us

HQ – Boston Metro

500 Unicorn Park Dr, Suite 300
Woburn, MA 01801

Sales: (339) 707-7929

Email: Sales Team

Email: Support Team

Careers

Contact Us

Security Requirements

Privacy Policy|

Cookie Policy

Copyright © 2026 CMD+CTRL Security. All Rights Reserved.
  • Follow
  • Follow
  • Follow