Advanced Web Application Security Testing Training

Web Application Security Testing Overview

This course is structured and designed to teach the participants about the advanced skills and techniques which is necessary to test modern web applications and technologies of the next-generation. The training is conducted with a combination of theoretical lecture, and hands-on exercises to teach the techniques and to test the security of internal enterprise web technologies, along with cutting edge Internet facing applications. Audience Web penetration testers Red team members Vulnerability assessment personnel Network penetration testers Security consultants Developers QA testers System administrators IT managers System architects

Web Application Penetration Testing Course schedule & Prices

Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 5 Days (10 Days for 4 Hours/Day)
Fee : 1,500 (Includes Taxes) 
9 AM - 5 PM (Flexible Time Slots for 4 hours option)

Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients. Click here

Get Quote

Course Prerequisites

A good understanding of web penetration techniques and methodologies. To be familiar with the HTTP protocol, HTML, and web applications. Minimum of two years’ experience in web penetration testing, successful completion of the GWAPT certification, or having attended the SEC542. Upon completion of this course, you will be able to accomplish To perform an advanced Local File Include (LFI) / Remote File Include (RFI), Blind SQL injection (SQLi), and Cross-Site Scripting (XSS) combined with Cross-Site Request Forger (XSRF) discovery and exploitation To exploit advanced vulnerabilities common to most backend language like Mass Assignments, Type Juggling, and Object Serialization Knowing to perform JavaScript-based injection against ExpressJS, Node.js, and NoSQL Understanding the special testing methods for content management systems such as SharePoint and WordPress Identifying and to exploit encryption implementations within web applications and frameworks Discover XML Entity and XPath vulnerabilities in SOAP or REST web services and other datastores To use tools and techniques to work with and exploit HTTP/2 and Web Sockets Identifying and to bypass the Web Application Firewalls and application filtering techniques to exploit the system