EC-Council/Certified Web Application Security Tester (C-WAST)


Certified Web Application Security Tester (C-WAST) Certification Training Course Overview

Certified Web Application Security Tester (C-WAST) is the most comprehensive and practical training course on web application security . This course is aimed at corporate audience. Most of corporate audience who are in role of design, code, testing always wanted something which is specific on web apps development, coding and security testing for web apps. Through this course, participants will come to understand major web application flaws and their exploitation and, most importantly, learn a field-tested and repeatable process to consistently find these flaws and convey what they have learned to their organizations.

Audience

The target audience for the program are professionals with experience in various phases of Software Development Life Cycles and Software Testing, and should be involved with any / all / either of the functions given below:

  • Head of Testing
  • Test Leads/Managers
  • Project Managers
  • Sr Test Engineers
  • Web Apps Coding
  • Application Programmers
  • Application Design
  • Ethical Hacking

Certified Web Application Security Tester (C-WAST) (40 Hours) Download Course Contents

Course Details Schedule
Live Virtual Classroom (Instructor-Led)

Fee : On Request
9 AM - 5 PM (Flexible Time Slots for 4 hours option)




March
8 Hours/Day
01-05
07-11
08-12
01-12
07-18
08-19
April
8 Hours/Day
05-09
11-15
12-16
19-23
05-16
11-22
12-23
19-30
May
8 Hours/Day
03-07
09-13
10-14
17-21
03-14
09-20
10-21
17-28
Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Our Trainers! Click here

Request More Information

Course Prerequisites
  • Basic Computer Knowledge.

After completion this course you will learn following topics:

  • You will be driven through a scope of best in class hacking instruments and procedures to enable you to direct a total web application security appraisal.
  • Once ready to distinguish and abuse vulnerabilities, you will get familiar with a scope of cautious counter measures, enabling you to create applications that are progressively impervious to assault and give a superior assurance to information resources.

 

FAQ's


No, the published fee includes all applicable taxes.