We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Application Security Engineer

Search

Clear Expand Collapse

AI-Powered SOC and Threat Intelligence

Learn about cutting edge trends in AI-Powered SOCs today!

Price
Course duration Duration: 45 minutes

Apple Certified Support Professional macOS 11

Apple Certified Support Professional (ACSP) certification confirms the candidate's understanding of macOS's core functionality as well as having the ability to configure key services, perform basic troubleshooting, and support multiple users with essential macOS capabilities.

Course duration Duration: 12 hours

CompTIA PenTest + (PT0-002)

PenTest+ assesses the most up-to-date penetration testing, and vulnerability assessment and management skills necessary to determine the resiliency of the network against attacks.

Course duration Duration: 17 hours, 49 min.

Embracing Developer-First Security for the Cloud Era

Join Iain Rose to discover how Snyk's AppSec and CloudSec platform empowers developers to build securely while maintaining competitive speed. Learn how Snyk stands out in the market, enabling scalable security and accelerated development.

Price
Course duration Duration: 12 minutes

Hands-On Web App Pentesting

This course is designed for those looking to gain skills related to penetration testing web applications.

Course duration Duration: 9 hours, 55 min.

Intro to Git

Version control is a cryptic yet essential part of a software development team. Git is a distributed version control system that allows collaboration and management of large scale software products (as well as other types of projects)

Course duration Duration: 3 hours, 31 min.

OWASP Top 10

This course is designed to teach you about the 2021 version of the OWASP Top 10 Web Application Vulnerabilities. The OWASP Top 10 is a list of the most critical security risks to web applications, and it is widely used by organizations to improve their web application security.

Course duration Duration: 8 hours

Security Misconfiguration with Tal Kollender

Tal Kollender highlights how human errors and default settings lead to 80% of ransomware attacks. Discover the risks of manual remediation and how automation can reduce misconfigurations, shrinking the attack surface and enhancing network protection.

Price
Course duration Duration: 27 minutes

The True Potential of Web Race Conditions

James Kettle of PortSwigger reveals sophisticated web race condition exploits, demonstrating how attackers can manipulate state machines and create backdoors through precise timing attacks.

Price
Course duration Duration: 45 minutes

Vulnerable Erlang

Master container security in our Vulnerable Erlang course! Exploit CVE-2025-32433, deploy vulnerable Docker containers, detect threats with Sysdig Falco, and secure systems. Ideal for security professionals, DevSecOps, and pentesters.

Course duration Duration: 1 hour, 30 min.

Vulnerable MinIO

Dive into the world of MinIO security as we uncover and exploit an information disclosure vulnerability, gaining access to sensitive data.

Vulnerable MinIO

Dive into the world of MinIO security as we uncover and exploit an information disclosure vulnerability, gaining access to sensitive data.

Course duration Duration: 1 hour, 30 min.

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement