security innovation logo stacked in color
  • Training
    • AppSec Training
    • Labs
    • Cyber Ranges
    • Skills Assessment
    • Courses
  • Solutions
    • Application Security Development
    • Developer Security Training
    • Mobile Application Security
  • Plans
  • Resources
  • Company
    • About Us
    • Partners
    • Newsroom
    • Contact Us
    • Careers
  • Blog
  • Request Demo

 Home/ Course Catalog/ Subject Matter/Standard

Standard

Courses

View All Courses
LAB 374 – Defending Python AI Applications from Misinformation (NEW)
5 Minutes
0.1 CPE
LAB 375 – Defending Python AI Applications from Unbounded Consumption (NEW)
5 Minutes
0.1 CPE
LAB 370 – Defending Python AI Applications from Improper Output Handling (NEW)
5 Minutes
0.1 CPE
LAB 371 – Defending Python AI Applications from Excessive Agency (NEW)
5 Minutes
0.1 CPE
LAB 368 – Defending Python AI Applications from Supply Chain Compromise (NEW)
5 Minutes
0.1 CPE
LAB 644 – Response: Detecting Malware in the Windows Startup Folder (NEW)
5 Minutes
0.1 CPE
LAB 645 – Response: Detecting Malware in the Registry Run Keys (NEW)
5 Minutes
0.1 CPE
LAB 643 – Response: Detecting a Malicious Windows Service (NEW)
5 Minutes
0.1 CPE
CYB 251 – Securing the AI/ML Infrastructure (NEW)
20 Minutes
0.4 CPE
COD 245 – Securing NoSQL Cloud Databases
25 Minutes
0.4 CPE
COD 289 – Securing Java Applications with Spring Security
25 Minutes
0.5 CPE
AWA 106 – Building Secure Software: Challenges in Application Security
5 Minutes
0.1 CPE
AWA 107 – Building Secure Software: Foundations & Best Practices
15 Minutes
0.3 CPE
AWA 108 – Building Secure Software: A Guide to Software Integration, Testing, and Deployment
20 Minutes
0.4 CPE
LAB 356 – Defending Python APIs from Broken Object Level Authorization
15 Minutes
0.3 CPE
LAB 357 – Defending Python APIs from Broken Authentication
15 Minutes
0.3 CPE
LAB 358 – Defending Python APIs from Broken Object Property Level Authorization
15 Minutes
0.3 CPE
LAB 359 – Defending Python APIs from Unrestricted Resource Consumption
15 Minutes
0.3 CPE
LAB 360 – Defending Python APIs from Broken Function Level Authorization
15 Minutes
0.3 CPE
LAB 361 – Defending Python APIs from Unrestricted Access to Sensitive Business Flows
15 Minutes
0.3 CPE
LAB 362 – Defending Python APIs from Server Side Request Forgery
15 Minutes
0.3 CPE
LAB 363 – Defending Python APIs from Security Misconfiguration
15 Minutes
0.3 CPE
LAB 364 – Defending Python APIs from Improper Inventory Management
15 Minutes
0.3 CPE
LAB 365 – Defending Python APIs from Unsafe Consumption of APIs
15 Minutes
0.3 CPE
LAB 640 – ATT&CK: Search Victim-Owned Websites
10 Minutes
0.2 CPE
LAB 641 – ATT&CK: Password Policy Discovery
10 Minutes
0.2 CPE
LAB 642 – ATT&CK: Permission Groups Discovery
10 Minutes
0.2 CPE
LAB 351 – Defending TypeScript Applications Against Cross-Site Scripting
15 Minutes
0.3 CPE
LAB 348 – Defending C++ Applications Against Null Pointer Dereference
15 Minutes
0.3 CPE
LAB 355 – Defending C Applications Against Stack-based Buffer Overflow
15 Minutes
0.3 CPE
LAB 638 – Using Mimikatz
15 Minutes
0.3 CPE
LAB 639 – Using an Exploit Framework via Command Line Interface
15 Minutes
0.3 CPE
LAB 353 – Defending TypeScript Applications Against Improper Authentication
15 Minutes
0.3 CPE
LAB 354 – Defending Go Applications Against Improper Authentication
15 Minutes
0.3 CPE
LAB 350 – Defending Go Applications Against SQL Injection
15 Minutes
0.3 CPE
LAB 352 – Defending Go Applications Against Cross-Site Scripting
15 Minutes
0.3 CPE
DES 270 – Mitigating OWASP Mobile Top 10 Risks
30 Minutes
0.6 CPE
LAB 349 – Defending TypeScript Applications Against SQL Injection
15 Minutes
0.3 CPE
COD 325 – Protecting Data in C# for .NET Core
30 Minutes
0.6 CPE
COD 310 – Securing ASP.NET Core Applications
20 Minutes
0.4 CPE
LAB 633 – Using an Exploit Framework for Web Application Scanning
30 Minutes
0.6 CPE
DES 250 – Secure Software Acceptance and Deployment
25 Minutes
0.5 CPE
LAB 340 – Defending C Applications Against Use After Free
15 Minutes
0.3 CPE
LAB 341 – Defending C++ Applications Against Use After Free
15 Minutes
0.3 CPE
LAB 347 – Defending C Applications Against Null Pointer Dereference
15 Minutes
0.3 CPE
LAB 329 – Defending Go Applications Against SSRF
15 Minutes
0.3 CPE
LAB 333 – Defending Go Applications Against Hard-coded Credentials
15 Minutes
0.3 CPE
LAB 338 – Defending Go Applications Against CSRF
15 Minutes
0.3 CPE
LAB 339 – Defending Go Applications Against Path Traversal
15 Minutes
0.3 CPE
LAB 342 – Defending TypeScript Applications Against Command Injection
15 Minutes
0.3 CPE
LAB 343 – Defending Go Applications Against Command Injection
15 Minutes
0.3 CPE
LAB 344 – Defending TypeScript Applications Against Incorrect Authorization
15 Minutes
0.3 CPE
LAB 345 – Defending Go Applications Against Incorrect Authorization
15 Minutes
0.3 CPE
LAB 346 – Defending TypeScript Applications Against Deserialization of Untrusted
15 Minutes
0.3 CPE
LAB 626 – Using an Exploit Framework for SQL Injection
30 Minutes
0.6 CPE
LAB 627 – Using an Exploit Framework for Port Scanning
15 Minutes
0.3 CPE
LAB 628 – Using an Exploit Framework for SMB Version Scanning
15 Minutes
0.3 CPE
LAB 629 – Using an Exploit Framework for SNMP Scanning
15 Minutes
0.3 CPE
API 351 – Securing Kubernetes in the Build and Release Stages
25 Minutes
0.5 CPE
LAB 327 – Defending C Applications Against Path Traversal
5 Minutes
.25 CPE
LAB 328 – Defending C++ Applications Against Path Traversal
5 Minutes
.25 CPE
LAB 616 – ATT&CK: Host Vulnerability Scanning
15 Minutes
.25 CPE
LAB 620 – ATT&CK: Advanced Exploit of Remote Services
30 Minutes
.25 CPE
LAB 625 – ATT&CK: Advanced Exploit of Public-Facing Application
30 Minutes
.25 CPE
COD 268 – Mitigating TypeScript Application Vulnerabilities
30 Minutes
.5 CPE
DES 364 – Mitigating Low-Code/No-Code Authentication and Secure Communication Failures
20 Minutes
.5 CPE
COD 304 – Principles of C++ Memory Safety
25 Minutes
.5 CPE
COD 305 – C++ Secure Memory Management
30 Minutes
.5 CPE
COD 306 – C++ Memory Safety: Debugging Tools and Techniques
20 Minutes
.5 CPE
LAB 206 – Defending Python Applications Against XPath Injection
5 Minutes
.1 CPE
LAB 207 – Defending Node.js Applications Against XPath Injection
5 Minutes
.1 CPE
LAB 208 – Defending C# Applications Against XPath Injection
5 Minutes
.1 CPE
LAB 619 – ATT&CK: Exfiltration Over C2 Channel
30 Minutes
.6 CPE
COD 215 – Mitigating .NET Application Vulnerabilities
25 Minutes
.5 CPE
CYB 213 – Generative AI Privacy & Cybersecurity Risk (UPDATED)
20 Minutes
.4 CPE
LAB 301 – Defending Java Applications Against Open Redirect
5 Minutes
.25 CPE
LAB 302 – Defending Python Applications Against Open Redirect
5 Minutes
.25 CPE
LAB 303 – Defending C# Applications Against Open Redirect
5 Minutes
.25 CPE
LAB 304 – Defending Node.js Applications Against Open Redirect
5 Minutes
.25 CPE
LAB 305 – Defending Java Applications Against Weak Password Reset
5 Minutes
.25 CPE
LAB 306 – Defending Python Applications Against Weak Password Reset
5 Minutes
.25 CPE
LAB 307 – Defending C# Applications Against Weak Password Reset
5 Minutes
0.25 CPE
LAB 308 – Defending Node.js Applications Against Weak Password Reset
5 Minutes
.25 CPE
LAB 309 – Defending TypeScript Applications Against Unrestricted Upload of File with Dangerous Type
5 Minutes
.25 CPE
LAB 314 – Defending TypeScript Applications Against SSRF
5 Minutes
.25 CPE
LAB 316 – Defending TypeScript Applications Against Hard-coded Credentials
5 Minutes
.25 CPE
LAB 320 – Defending TypeScript Applications Against Code Injection
5 Minutes
.25 CPE
LAB 325 – Defending TypeScript Applications Against CSRF
5 Minutes
.25 CPE
LAB 326 – Defending TypeScript Applications Against Path Traversal
5 Minutes
.25 CPE
COD 288 – Java Public Key Cryptography
20 Minutes
0.5 CPE
LAB 287 – Defending Java Applications Against Null Pointer Dereference
10 Minutes
.25 CPE
LAB 288 – Defending C# Applications Against Null Pointer Dereference
10 Minutes
.25 CPE
LAB 289 – Defending Java Applications Against Path Traversal
10 Minutes
.25 CPE
LAB 290 – Defending Python Applications Against Path Traversal
10 Minutes
.25 CPE
LAB 291 – Defending Node.js Applications Against Path Traversal
10 Minutes
.25 CPE
LAB 292 – Defending C# Applications Against Path Traversal
10 Minutes
.25 CPE
LAB 293 – Defending Java Applications Against Integer Overflow
10 Minutes
.25 CPE
LAB 294 – Defending C# Applications Against Integer Overflow
10 Minutes
.25 CPE
LAB 617 – ATT&CK: Testing for Plaintext Secrets in Files
12 Minutes
.25 CPE
LAB 618 – ATT&CK: Log Analysis
12 Minutes
.25 CPE
security innovation white logo
Trusted since 2002, CMD+CTRL delivers mid-size to enterprise-ready software security training through interactive modules, real-world labs, and hands-on cyber ranges.

Training & Product

AppSec Training

Cyber Range

Skills Assessment

Courses

Labs

Solutions

Application Security Development

Developer Security Training

Mobile Application Security

About Us

HQ – Boston Metro

500 Unicorn Park Dr, Suite 300
Woburn, MA 01801

Sales: (339) 707-7929

Email: Sales Team

Email: Support Team

Careers

Contact Us

Security Requirements

Privacy Policy|

Cookie Policy

Copyright © 2025 CMD+CTRL Security. All Rights Reserved.
  • Follow
  • Follow
  • Follow