COD 248 – PCI DSS Requirement 6: Develop and Maintain Secure Systems and Applications 15 Minutes.25 CPE
ENG 320 – Using Software Composition Analysis (SCA) to Secure Open-Source Components 20 Minutes0.5 CPE
LAB 133 – Identifying Exposure of Sensitive Information Through Environmental Variables 5 Minutes0.25 CPE
LAB 136 – Identifying Improper Neutralization of Script in Attributes in a Web Page 5 Minutes0.25 CPE
LAB 215 – Defending Java Applications Against Business Logic Error for Input Validation 10 Minutes.25 CPE
LAB 216 – Defending Python Applications Against Business Logic Error for Input Validation 10 Minutes.25 CPE
LAB 217 – Defending Node.js Applications Against Business Logic Error for Input Validation 10 Minutes.25 CPE
LAB 218 – Defending C# Applications Against Business Logic Error for Input Validation 10 Minutes.25 CPE
LAB 236 – Defending Java Applications Against Sensitive Information in Error Messages 10 Minutes0.25 CPE
LAB 240 – Defending Java Applications Against eXternal XML Entity (XXE) Vulnerabilities 10 Minutes0.25 CPE
LAB 241 – Defending C# Applications Against eXternal XML Entity (XXE) Vulnerabilities 10 Minutes0.25 CPE
LAB 242 – Defending Node.js Applications Against eXternal XML Entity (XXE) Vulnerabilities 10 Minutes0.25 CPE
LAB 243 – Defending Python Applications Against eXternal XML Entity (XXE) Vulnerabilities 10 Minutes0.25 CPE
LAB 260 – Defending C# Applications Against Sensitive Information in Error Messages 10 Minutes0.25 CPE