Skip to navigation Skip to navigation Skip to search form Skip to login form Skip to footer Skip to main content
Cybersecurity Awareness TrainingCybersecurity Awareness Training
  • HOME
  • COURSES
    • CREATE
    • UPLOAD
    • MANAGE
    • OVERVIEW
    • COURSES
    • USERS
    • LOGINS
    • BLOG
      • APPSEC AWARENESS
      • SECURITY AWARENESS
      • JUST-IN-TIME MICROLESSONS
  • CONTACT

My courses | LMS

  1. Home
  2. Site pages
  3. My courses
Skip My courses
My courses
Sort
Name Date
Order
Ascending Descending
List
List Card
  • Available courses
  • Courses in progress
  • Completed courses
  • Course image
    Course is starred Course name API Security
  • Course image
    Course is starred Course name App Sec Foundational Exam for Managers
  • Course image
    Course is starred Course name App Sec Foundations: Foundational Exam
  • Course image
    Course is starred Course name App Sec Foundations
  • Course image
    Course is starred Course name App Sec Foundations for Managers
  • Course image
    Course is starred Course name Broken Access Control
  • Course image
    Course is starred Course name Broken Authentication
  • Course image
    Course is starred Course name Building Secure .NET Applications
  • Course image
    Course is starred Course name Building Secure C/C++ Applications
  • Course image
    Course is starred Course name Building Secure Go Applications
  • Course image
    Course is starred Course name Building Secure Java Applications
  • Course image
    Course is starred Course name Building Secure JavaScript Applications
  • Course image
    Course is starred Course name Building Secure Mobile Applications
  • Course image
    Course is starred Course name Building Secure Python Applications
  • Course image
    Course is starred Course name Building Secure Ruby Applications
  • Course image
    Course is starred Course name Cross-Site Request Forgery
  • Course image
    Course is starred Course name Cross-Site Scripting
  • Course image
    Course is starred Course name Deriving Security Requirements within the SDLC Planning Phase
  • Course image
    Course is starred Course name Docker and Application Container Security
  • Course image
    Course is starred Course name Foundational Exam for Developers
  • Course image
    Course is starred Course name General Security Awareness
  • Course image
    Course is starred Course name IaC: Identity and Access Management in AWS
  • Course image
    Course is starred Course name IaC: Identity and Access Management in GCP
  • Course image
    Course is starred Course name Injection
  • Course image
    Course is starred Course name Insecure Deserialization
  • Course image
    Course is starred Course name Insufficient Logging and Monitoring
  • Course image
    Course is starred Course name Integrating Security Throughout the SDLC
  • Course image
    Course is starred Course name Introduction to Application Security
  • Course image
    Course is starred Course name Mobile App Sec Foundations for Developers
  • Course image
    Course is starred Course name Mobile App Sec Foundations for Managers
  • Course image
    Course is starred Course name OWASP Top Ten at a Glance
  • Course image
    Course is starred Course name Securing the Supply Chain
  • Course image
    Course is starred Course name Security Considerations for Extended Telework
  • Course image
    Course is starred Course name Security Misconfiguration
  • Course image
    Course is starred Course name Sensitive Data Exposure
  • Course image
    Course is starred Course name Server-Side Request Forgery
  • Course image
    Course is starred Course name Threat Modeling
  • Course image
    Course is starred Course name Using Components with Known Vulnerabilities
  • Course image
    Course is starred Course name XML External Entities

  • No courses in progress

    No courses in progress


  • No completed courses

    No completed courses

Skip Course overview
Course overview

  •  
  • All
  •  
  • In progress
  • Future
  • Past
  •  
  • Starred
  •  
  • Removed from view
  • Sort by course name
  • Sort by last accessed
  • Card
  • List
  • Summary
Skip My courses
My courses
Sort
Name Date
Order
Ascending Descending
List
List Card
  • Available courses
  • Courses in progress
  • Completed courses
  • Course image
    Course is starred Course name API Security
  • Course image
    Course is starred Course name App Sec Foundational Exam for Managers
  • Course image
    Course is starred Course name App Sec Foundations: Foundational Exam
  • Course image
    Course is starred Course name App Sec Foundations
  • Course image
    Course is starred Course name App Sec Foundations for Managers
  • Course image
    Course is starred Course name Broken Access Control
  • Course image
    Course is starred Course name Broken Authentication
  • Course image
    Course is starred Course name Building Secure .NET Applications
  • Course image
    Course is starred Course name Building Secure C/C++ Applications
  • Course image
    Course is starred Course name Building Secure Go Applications
  • Course image
    Course is starred Course name Building Secure Java Applications
  • Course image
    Course is starred Course name Building Secure JavaScript Applications
  • Course image
    Course is starred Course name Building Secure Mobile Applications
  • Course image
    Course is starred Course name Building Secure Python Applications
  • Course image
    Course is starred Course name Building Secure Ruby Applications
  • Course image
    Course is starred Course name Cross-Site Request Forgery
  • Course image
    Course is starred Course name Cross-Site Scripting
  • Course image
    Course is starred Course name Deriving Security Requirements within the SDLC Planning Phase
  • Course image
    Course is starred Course name Docker and Application Container Security
  • Course image
    Course is starred Course name Foundational Exam for Developers
  • Course image
    Course is starred Course name General Security Awareness
  • Course image
    Course is starred Course name IaC: Identity and Access Management in AWS
  • Course image
    Course is starred Course name IaC: Identity and Access Management in GCP
  • Course image
    Course is starred Course name Injection
  • Course image
    Course is starred Course name Insecure Deserialization
  • Course image
    Course is starred Course name Insufficient Logging and Monitoring
  • Course image
    Course is starred Course name Integrating Security Throughout the SDLC
  • Course image
    Course is starred Course name Introduction to Application Security
  • Course image
    Course is starred Course name Mobile App Sec Foundations for Developers
  • Course image
    Course is starred Course name Mobile App Sec Foundations for Managers
  • Course image
    Course is starred Course name OWASP Top Ten at a Glance
  • Course image
    Course is starred Course name Securing the Supply Chain
  • Course image
    Course is starred Course name Security Considerations for Extended Telework
  • Course image
    Course is starred Course name Security Misconfiguration
  • Course image
    Course is starred Course name Sensitive Data Exposure
  • Course image
    Course is starred Course name Server-Side Request Forgery
  • Course image
    Course is starred Course name Threat Modeling
  • Course image
    Course is starred Course name Using Components with Known Vulnerabilities
  • Course image
    Course is starred Course name XML External Entities

  • No courses in progress

    No courses in progress


  • No completed courses

    No completed courses

Skip Navigation
Navigation
  • Home

    • Site pages

      • My courses

      • Site blogs

      • Tags

      • PageApp Sec Essentials

      • PageBuilding Secure Applications

      • ForumSite announcements

      • PageGeneral Security Awareness

      • PageInfrastructure as Code Series

      • PageGeneral Security Awareness

      • PageDashboard 2023

      • PageSecurity Operations Series

    • My courses

    • Courses

  • info@infraredsecurity.com
  • LinkedIn
© 2023 Infrared Security, LLC.
All Rights Reserved.

Course Categories

  • App Sec Essentials
  • Building Secure Applications
  • Security Operations
  • Infrastructure as Code
  • Security Awareness

Popular Courses

  • Integrating Security Throughout the SDLC
  • Securing the Supply Chain
  • App Sec Foundations
  • API Security
  • Building Secure JavaScript Applications
 
Scroll to top

Log in

Show
Forgotten your username or password?