• Training
    • AppSec Training
    • Cyber Ranges
    • Skills Assessment
    • Tabletop Exercises
    • Labs
    • Courses
  • Solutions
    • Financial Services
    • Application Security Development
    • Developer Security Training
    • Mobile Application Security
  • For Individuals
  • Plans
  • Resources
  • Company
    • About Us
    • Partners
    • Newsroom
    • Contact Us
    • Careers
  • Blog
  • Free Trial
  • Request Demo
  • Login

 Home/ Course Catalog/ Subject Matter/Skill Lab

Skill Lab

Courses

View All Courses
LAB 376 – Defending Node.js AI Applications from Prompt Injection
15 Minutes
.30 CPE
LAB 377 – Defending Node.js AI Applications from Improper Output Handling
15 Minutes
.30 CPE
LAB 378 – Defending Node.js AI Applications from System Prompt Leakage
15 Minutes
.30 CPE
LAB 379 – Defending Node.js AI Applications from Misinformation
15 Minutes
.30 CPE
LAB 380 – Defending Node.js AI Applications from Unbounded Consumption
15 Minutes
.30 CPE
LAB 646 – Response: Detecting a JSP Backdoor
15 Minutes
0.30 CPE
LAB 647 – Response: Investigating an Antimalware Alert
15 Minutes
0.30 CPE
LAB 648 – Response: Detecting a Malicious Windows Scheduled Task
15 Minutes
0.30 CPE
LAB 372 – Defending Python AI Applications from System Prompt Leakage
5 Minutes
0.1 CPE
LAB 373 – Defending Python AI Applications from Vector and Embedding Weaknesses
5 Minutes
0.1 CPE
LAB 369 – Defending Python AI Applications from Data and Model Poisoning
5 Minutes
0.1 CPE
LAB 367 – Defending Python AI Applications from Sensitive Information Disclosure
5 Minutes
0.1 CPE
LAB 366 – Defending Python AI Applications from Prompt Injection
5 Minutes
0.1 CPE
LAB 374 – Defending Python AI Applications from Misinformation
5 Minutes
0.1 CPE
LAB 375 – Defending Python AI Applications from Unbounded Consumption
5 Minutes
0.1 CPE
LAB 370 – Defending Python AI Applications from Improper Output Handling
5 Minutes
0.1 CPE
LAB 371 – Defending Python AI Applications from Excessive Agency
5 Minutes
0.1 CPE
LAB 368 – Defending Python AI Applications from Supply Chain Compromise
5 Minutes
0.1 CPE
LAB 644 – Response: Detecting Malware in the Windows Startup Folder
5 Minutes
0.1 CPE
LAB 645 – Response: Detecting Malware in the Registry Run Keys
5 Minutes
0.1 CPE
LAB 643 – Response: Detecting a Malicious Windows Service
5 Minutes
0.1 CPE
LAB 356 – Defending Python APIs from Broken Object Level Authorization
15 Minutes
0.3 CPE
LAB 357 – Defending Python APIs from Broken Authentication
15 Minutes
0.3 CPE
LAB 358 – Defending Python APIs from Broken Object Property Level Authorization
15 Minutes
0.3 CPE
LAB 359 – Defending Python APIs from Unrestricted Resource Consumption
15 Minutes
0.3 CPE
LAB 360 – Defending Python APIs from Broken Function Level Authorization
15 Minutes
0.3 CPE
LAB 361 – Defending Python APIs from Unrestricted Access to Sensitive Business Flows
15 Minutes
0.3 CPE
LAB 362 – Defending Python APIs from Server Side Request Forgery
15 Minutes
0.3 CPE
LAB 363 – Defending Python APIs from Security Misconfiguration
15 Minutes
0.3 CPE
LAB 364 – Defending Python APIs from Improper Inventory Management
15 Minutes
0.3 CPE
LAB 365 – Defending Python APIs from Unsafe Consumption of APIs
15 Minutes
0.3 CPE
LAB 640 – ATT&CK: Search Victim-Owned Websites
10 Minutes
0.2 CPE
LAB 641 – ATT&CK: Password Policy Discovery
10 Minutes
0.2 CPE
LAB 642 – ATT&CK: Permission Groups Discovery
10 Minutes
0.2 CPE
LAB 351 – Defending TypeScript Applications Against Cross-Site Scripting
15 Minutes
0.3 CPE
LAB 348 – Defending C++ Applications Against Null Pointer Dereference
15 Minutes
0.3 CPE
LAB 355 – Defending C Applications Against Stack-based Buffer Overflow
15 Minutes
0.3 CPE
LAB 638 – Using Mimikatz
15 Minutes
0.3 CPE
LAB 639 – Using an Exploit Framework via Command Line Interface
15 Minutes
0.3 CPE
LAB 353 – Defending TypeScript Applications Against Improper Authentication
15 Minutes
0.3 CPE
LAB 354 – Defending Go Applications Against Improper Authentication
15 Minutes
0.3 CPE
LAB 350 – Defending Go Applications Against SQL Injection
15 Minutes
0.3 CPE
LAB 352 – Defending Go Applications Against Cross-Site Scripting
15 Minutes
0.3 CPE
LAB 349 – Defending TypeScript Applications Against SQL Injection
15 Minutes
0.3 CPE
LAB 633 – Using an Exploit Framework for Web Application Scanning
30 Minutes
0.6 CPE
DES 250 – Secure Software Acceptance and Deployment
25 Minutes
0.5 CPE
LAB 340 – Defending C Applications Against Use After Free
15 Minutes
0.3 CPE
LAB 341 – Defending C++ Applications Against Use After Free
15 Minutes
0.3 CPE
LAB 347 – Defending C Applications Against Null Pointer Dereference
15 Minutes
0.3 CPE
LAB 329 – Defending Go Applications Against SSRF
15 Minutes
0.3 CPE
LAB 333 – Defending Go Applications Against Hard-coded Credentials
15 Minutes
0.3 CPE
LAB 338 – Defending Go Applications Against CSRF
15 Minutes
0.3 CPE
LAB 339 – Defending Go Applications Against Path Traversal
15 Minutes
0.3 CPE
LAB 342 – Defending TypeScript Applications Against Command Injection
15 Minutes
0.3 CPE
LAB 343 – Defending Go Applications Against Command Injection
15 Minutes
0.3 CPE
LAB 344 – Defending TypeScript Applications Against Incorrect Authorization
15 Minutes
0.3 CPE
LAB 345 – Defending Go Applications Against Incorrect Authorization
15 Minutes
0.3 CPE
LAB 346 – Defending TypeScript Applications Against Deserialization of Untrusted
15 Minutes
0.3 CPE
LAB 626 – Using an Exploit Framework for SQL Injection
30 Minutes
0.6 CPE
LAB 628 – Using an Exploit Framework for SMB Version Scanning
15 Minutes
0.3 CPE
LAB 629 – Using an Exploit Framework for SNMP Scanning
15 Minutes
0.3 CPE
LAB 327 – Defending C Applications Against Path Traversal
5 Minutes
.25 CPE
LAB 328 – Defending C++ Applications Against Path Traversal
5 Minutes
.25 CPE
LAB 616 – ATT&CK: Host Vulnerability Scanning
15 Minutes
.25 CPE
LAB 620 – ATT&CK: Advanced Exploit of Remote Services
30 Minutes
.25 CPE
LAB 625 – ATT&CK: Advanced Exploit of Public-Facing Application
30 Minutes
.25 CPE
COD 268 – Mitigating TypeScript Application Vulnerabilities
30 Minutes
.5 CPE
LAB 206 – Defending Python Applications Against XPath Injection
5 Minutes
.1 CPE
LAB 207 – Defending Node.js Applications Against XPath Injection
5 Minutes
.1 CPE
LAB 208 – Defending C# Applications Against XPath Injection
5 Minutes
.1 CPE
LAB 619 – ATT&CK: Exfiltration Over C2 Channel
30 Minutes
.6 CPE
LAB 301 – Defending Java Applications Against Open Redirect
5 Minutes
.25 CPE
LAB 302 – Defending Python Applications Against Open Redirect
5 Minutes
.25 CPE
LAB 303 – Defending C# Applications Against Open Redirect
5 Minutes
.25 CPE
LAB 304 – Defending Node.js Applications Against Open Redirect
5 Minutes
.25 CPE
LAB 305 – Defending Java Applications Against Weak Password Reset
5 Minutes
.25 CPE
LAB 306 – Defending Python Applications Against Weak Password Reset
5 Minutes
.25 CPE
LAB 307 – Defending C# Applications Against Weak Password Reset
5 Minutes
0.25 CPE
LAB 308 – Defending Node.js Applications Against Weak Password Reset
5 Minutes
.25 CPE
LAB 309 – Defending TypeScript Applications Against Unrestricted Upload of File with Dangerous Type
5 Minutes
.25 CPE
LAB 314 – Defending TypeScript Applications Against SSRF
5 Minutes
.25 CPE
LAB 316 – Defending TypeScript Applications Against Hard-coded Credentials
5 Minutes
.25 CPE
LAB 320 – Defending TypeScript Applications Against Code Injection
5 Minutes
.25 CPE
LAB 325 – Defending TypeScript Applications Against CSRF
5 Minutes
.25 CPE
LAB 326 – Defending TypeScript Applications Against Path Traversal
5 Minutes
.25 CPE
LAB 287 – Defending Java Applications Against Null Pointer Dereference
10 Minutes
.25 CPE
LAB 288 – Defending C# Applications Against Null Pointer Dereference
10 Minutes
.25 CPE
LAB 289 – Defending Java Applications Against Path Traversal
10 Minutes
.25 CPE
LAB 290 – Defending Python Applications Against Path Traversal
10 Minutes
.25 CPE
LAB 291 – Defending Node.js Applications Against Path Traversal
10 Minutes
.25 CPE
LAB 292 – Defending C# Applications Against Path Traversal
10 Minutes
.25 CPE
LAB 293 – Defending Java Applications Against Integer Overflow
10 Minutes
.25 CPE
LAB 294 – Defending C# Applications Against Integer Overflow
10 Minutes
.25 CPE
LAB 617 – ATT&CK: Testing for Plaintext Secrets in Files
12 Minutes
.25 CPE
LAB 618 – ATT&CK: Log Analysis
12 Minutes
.25 CPE
LAB 201 – Defending Java Applications Against Canonicalization
5 Minutes
.1 CPE
LAB 202 – Defending Python Applications Against Canonicalization
5 Minutes
.1 CPE
LAB 203 – Defending C# Applications Against Canonicalization
5 Minutes
.1 CPE
LAB 204 – Defending Node.js Applications Against Canonicalization
5 Minutes
.1 CPE
LAB 275 – Defending Java Applications Against Command Injection
10 Minutes
0.25 CPE
security innovation white logo

Trusted since 2002, CMD+CTRL Security delivers mid-size to enterprise-ready software security training through interactive modules, real-world labs, and hands-on cyber ranges.

~
BUILD SKILLS THAT STICK
  • Follow
  • Follow
  • Follow

PRODUCT

AppSec Training

Cyber Range

Skills Assessment

Courses Library

Interactive Labs

SOLUTIONS

Financial Services

AppSec Development

Developer Training

Mobile Security

COMPANY

About Us

Contact Us

Careers

Partners

Security
Trust Center

Stay Secure

Stay informed about the latest developments, upcoming product releases, and insider industry news.

Success!

Subscribe

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Unsubscribe at any time. Read our Privacy Policy.


HQ – Boston Metro
500 Unicorn Park Dr, Suite 300
Woburn, MA 01801

(339) 707-7929

Sales Team
Support Team
Copyright © 2026 CMD+CTRL Security. All Rights Reserved.
Privacy Policy| Cookie Policy