• Training
    • AppSec Training
    • Cyber Ranges
    • Skills Assessment
    • Labs
    • Courses
  • Solutions
    • Financial Services
    • Application Security Development
    • Developer Security Training
    • Mobile Application Security
  • Plans
  • Resources
  • Company
    • About Us
    • Partners
    • Newsroom
    • Contact Us
    • Careers
  • Blog
  • Request Demo
  • Login

 Home/ Course Catalog/ Subject Matter/Type

Type

Courses

View All Courses
COD 252 – Securing Google Platform Applications & Data (NEW)
30 Minutes
0.60 CPE
DES 220 – Secure AWS CloudFormation Configuration (NEW)
25 Minutes
0.50 CPE
API 210 – Protecting APIs from Unrestricted Resource Consumption (UPDATED)
15 Minutes
0.3 CPE
API 211 – Protecting APIs Broken Object Level Authorization (UPDATED)
15 Minutes
0.3 CPE
API 213 – Protecting APIs from Broken Object Property Level Authorization (UPDATED)
15 Minutes
0.3 CPE
API 214 – Protecting APIs Improper Asset Management (UPDATED)
15 Minutes
0.3 CPE
DES 215 – Defending the Infrastructure (UPDATED)
25 Minutes
0.5 CPE
DES 216 – Protecting Cloud Infrastructure (UPDATED)
20 Minutes
0.4 CPE
ENG 211 – How to Create Application Security Design Requirements (UPDATED)
25 Minutes
0.5 CPE
LAB 376 – Defending Node.js AI Applications from Prompt Injection
15 Minutes
.30 CPE
LAB 377 – Defending Node.js AI Applications from Improper Output Handling
15 Minutes
.30 CPE
LAB 378 – Defending Node.js AI Applications from System Prompt Leakage
15 Minutes
.30 CPE
LAB 379 – Defending Node.js AI Applications from Misinformation
15 Minutes
.30 CPE
LAB 380 – Defending Node.js AI Applications from Unbounded Consumption
15 Minutes
.30 CPE
DES 200 – Fundamentals of Cryptography, Key Management and Digital Certificates
35 Minutes
.70 CPE
DES 201 – Securing Applications and their Data with Cryptography
25 Minutes
.50 CPE
COD 261 – Threats to Scripts
25 Minutes
0.50 CPE
TST 101 – Fundamentals of Security Testing
15 Minutes
0.30 CPE
ENG 151 – Fundamentals of Privacy Protection
20 Minutes
0.40 CPE
DES 206 – Meeting Cloud Governance and Compliance Requirements
20 Minutes
0.40 CPE
ATK 201 – Using the MITRE ATT&CK Framework
20 Minutes
0.40 CPE
CYB 350 – AI Driven Incident Analysis Techniques
20 Minutes
0.40 CPE
ENG 118 – Essential Cyber Incident Response Planning
15 Minutes
0.30 CPE
LAB 646 – Response: Detecting a JSP Backdoor
15 Minutes
0.30 CPE
LAB 647 – Response: Investigating an Antimalware Alert
15 Minutes
0.30 CPE
LAB 648 – Response: Detecting a Malicious Windows Scheduled Task
15 Minutes
0.30 CPE
LAB 372 – Defending Python AI Applications from System Prompt Leakage
5 Minutes
0.1 CPE
LAB 373 – Defending Python AI Applications from Vector and Embedding Weaknesses
5 Minutes
0.1 CPE
LAB 369 – Defending Python AI Applications from Data and Model Poisoning
5 Minutes
0.1 CPE
LAB 367 – Defending Python AI Applications from Sensitive Information Disclosure
5 Minutes
0.1 CPE
LAB 366 – Defending Python AI Applications from Prompt Injection
5 Minutes
0.1 CPE
LAB 374 – Defending Python AI Applications from Misinformation
5 Minutes
0.1 CPE
LAB 375 – Defending Python AI Applications from Unbounded Consumption
5 Minutes
0.1 CPE
LAB 370 – Defending Python AI Applications from Improper Output Handling
5 Minutes
0.1 CPE
LAB 371 – Defending Python AI Applications from Excessive Agency
5 Minutes
0.1 CPE
LAB 368 – Defending Python AI Applications from Supply Chain Compromise
5 Minutes
0.1 CPE
LAB 644 – Response: Detecting Malware in the Windows Startup Folder
5 Minutes
0.1 CPE
LAB 645 – Response: Detecting Malware in the Registry Run Keys
5 Minutes
0.1 CPE
LAB 643 – Response: Detecting a Malicious Windows Service
5 Minutes
0.1 CPE
CYB 251 – Securing the AI/ML Infrastructure
20 Minutes
0.4 CPE
COD 245 – Securing NoSQL Cloud Databases
25 Minutes
0.4 CPE
COD 289 – Securing Java Applications with Spring Security
25 Minutes
0.5 CPE
AWA 106 – Building Secure Software: Challenges in Application Security
5 Minutes
0.1 CPE
AWA 107 – Building Secure Software: Foundations & Best Practices
15 Minutes
0.3 CPE
AWA 108 – Building Secure Software: A Guide to Software Integration, Testing, and Deployment
20 Minutes
0.4 CPE
LAB 356 – Defending Python APIs from Broken Object Level Authorization
15 Minutes
0.3 CPE
LAB 357 – Defending Python APIs from Broken Authentication
15 Minutes
0.3 CPE
LAB 358 – Defending Python APIs from Broken Object Property Level Authorization
15 Minutes
0.3 CPE
LAB 359 – Defending Python APIs from Unrestricted Resource Consumption
15 Minutes
0.3 CPE
LAB 360 – Defending Python APIs from Broken Function Level Authorization
15 Minutes
0.3 CPE
LAB 361 – Defending Python APIs from Unrestricted Access to Sensitive Business Flows
15 Minutes
0.3 CPE
LAB 362 – Defending Python APIs from Server Side Request Forgery
15 Minutes
0.3 CPE
LAB 363 – Defending Python APIs from Security Misconfiguration
15 Minutes
0.3 CPE
LAB 364 – Defending Python APIs from Improper Inventory Management
15 Minutes
0.3 CPE
LAB 365 – Defending Python APIs from Unsafe Consumption of APIs
15 Minutes
0.3 CPE
LAB 640 – ATT&CK: Search Victim-Owned Websites
10 Minutes
0.2 CPE
LAB 641 – ATT&CK: Password Policy Discovery
10 Minutes
0.2 CPE
LAB 642 – ATT&CK: Permission Groups Discovery
10 Minutes
0.2 CPE
LAB 351 – Defending TypeScript Applications Against Cross-Site Scripting
15 Minutes
0.3 CPE
LAB 348 – Defending C++ Applications Against Null Pointer Dereference
15 Minutes
0.3 CPE
LAB 355 – Defending C Applications Against Stack-based Buffer Overflow
15 Minutes
0.3 CPE
LAB 638 – Using Mimikatz
15 Minutes
0.3 CPE
LAB 639 – Using an Exploit Framework via Command Line Interface
15 Minutes
0.3 CPE
LAB 353 – Defending TypeScript Applications Against Improper Authentication
15 Minutes
0.3 CPE
LAB 354 – Defending Go Applications Against Improper Authentication
15 Minutes
0.3 CPE
LAB 350 – Defending Go Applications Against SQL Injection
15 Minutes
0.3 CPE
LAB 352 – Defending Go Applications Against Cross-Site Scripting
15 Minutes
0.3 CPE
DES 270 – Mitigating OWASP Mobile Top 10 Risks
30 Minutes
0.6 CPE
LAB 349 – Defending TypeScript Applications Against SQL Injection
15 Minutes
0.3 CPE
COD 325 – Protecting Data in C# for .NET Core
30 Minutes
0.6 CPE
COD 310 – Securing ASP.NET Core Applications
20 Minutes
0.4 CPE
LAB 633 – Using an Exploit Framework for Web Application Scanning
30 Minutes
0.6 CPE
DES 250 – Secure Software Acceptance and Deployment
25 Minutes
0.5 CPE
LAB 340 – Defending C Applications Against Use After Free
15 Minutes
0.3 CPE
LAB 341 – Defending C++ Applications Against Use After Free
15 Minutes
0.3 CPE
LAB 347 – Defending C Applications Against Null Pointer Dereference
15 Minutes
0.3 CPE
LAB 329 – Defending Go Applications Against SSRF
15 Minutes
0.3 CPE
LAB 333 – Defending Go Applications Against Hard-coded Credentials
15 Minutes
0.3 CPE
LAB 338 – Defending Go Applications Against CSRF
15 Minutes
0.3 CPE
LAB 339 – Defending Go Applications Against Path Traversal
15 Minutes
0.3 CPE
LAB 342 – Defending TypeScript Applications Against Command Injection
15 Minutes
0.3 CPE
LAB 343 – Defending Go Applications Against Command Injection
15 Minutes
0.3 CPE
LAB 344 – Defending TypeScript Applications Against Incorrect Authorization
15 Minutes
0.3 CPE
LAB 345 – Defending Go Applications Against Incorrect Authorization
15 Minutes
0.3 CPE
LAB 346 – Defending TypeScript Applications Against Deserialization of Untrusted
15 Minutes
0.3 CPE
LAB 626 – Using an Exploit Framework for SQL Injection
30 Minutes
0.6 CPE
LAB 628 – Using an Exploit Framework for SMB Version Scanning
15 Minutes
0.3 CPE
LAB 629 – Using an Exploit Framework for SNMP Scanning
15 Minutes
0.3 CPE
API 351 – Securing Kubernetes in the Build and Release Stages
25 Minutes
0.5 CPE
LAB 327 – Defending C Applications Against Path Traversal
5 Minutes
.25 CPE
LAB 328 – Defending C++ Applications Against Path Traversal
5 Minutes
.25 CPE
LAB 616 – ATT&CK: Host Vulnerability Scanning
15 Minutes
.25 CPE
LAB 620 – ATT&CK: Advanced Exploit of Remote Services
30 Minutes
.25 CPE
LAB 625 – ATT&CK: Advanced Exploit of Public-Facing Application
30 Minutes
.25 CPE
COD 268 – Mitigating TypeScript Application Vulnerabilities
30 Minutes
.5 CPE
DES 364 – Mitigating Low-Code/No-Code Authentication and Secure Communication Failures
20 Minutes
.5 CPE
COD 304 – Principles of C++ Memory Safety
25 Minutes
.5 CPE
COD 305 – C++ Secure Memory Management
30 Minutes
.5 CPE
COD 306 – C++ Memory Safety: Debugging Tools and Techniques
20 Minutes
.5 CPE
LAB 206 – Defending Python Applications Against XPath Injection
5 Minutes
.1 CPE
security innovation white logo

Trusted since 2002, CMD+CTRL Security delivers mid-size to enterprise-ready software security training through interactive modules, real-world labs, and hands-on cyber ranges.

~
BUILD SKILLS THAT STICK
  • Follow
  • Follow
  • Follow

PRODUCT

AppSec Training

Cyber Range

Skills Assessment

Courses Library

Interactive Labs

SOLUTIONS

Financial Services

AppSec Development

Developer Training

Mobile Security

COMPANY

About Us

Contact Us

Careers

Partners

Security Req.

Stay Secure

Stay informed about the latest developments, upcoming product releases, and insider industry news.

Success!

Subscribe

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Unsubscribe at any time. Read our Privacy Policy.


HQ – Boston Metro
500 Unicorn Park Dr, Suite 300
Woburn, MA 01801

(339) 707-7929

Sales Team
Support Team
Copyright © 2026 CMD+CTRL Security. All Rights Reserved.
Privacy Policy| Cookie Policy