Ethical Hacking of Web Applications_

OWASP approach, web component manipulation, and manual verification: find vulnerabilities before an attacker does.

What you’ll get to try out in practice during the course:

  • You will learn about the OWASP Top 10 methodology and its application in testing.
  • You’ll learn how web applications communicate and how they’re built.
  • You will learn how to identify vulnerabilities, why they arise, and how they can be exploited—as well as how to effectively prevent them.
  • Practical techniques for SQL injection and cross-site scripting (XSS) attacks.
  • Attacks aimed at stealing login credentials and how to prevent them.
  • Manipulation of HTTP communication and other related techniques.
  • Each participant will have the opportunity to try everything out during the hands-on exercises.

Who is this course intended for?

The course is primarily designed for beginners—no prior experience with hacking or app development is required. The course will also be useful for:

  • Computer science students
  • Ethical hackers and penetration testers
  • Network Administrators
  • Security Managers

Requirements

Basic understanding of IT issues.
No prior experience with Linux or programming is required.


Course outline:

The course lasts 1 day
from 9:00 a.m. to 4:00 p.m., with a one-hour lunch break.

The following will be available during the training:
Wi-Fi connection
Coffee, tea, water, lunch, and light snacks
Notebook and pen
Upon completion of the course, you will receive a certificate of completion.