|| 6 days
||9.00am - 5.00pm
Click here to contact us
In SEC542, you will practice the art of exploiting web applications to find flaws in your enterprise's web apps. You'll learn about the attacker's tools and methods in order to be a more powerful defender. Through detailed, hands-on exercises and with guidance from the instructor, you will learn the four-step process for web application penetration testing; inject SQL into back-end databases to learn how attackers exfiltrate sensitive data; and utilize cross-site scripting attacks to dominate a target infrastructure. You will also explore various other web app vulnerabilities in-depth using proven techniques and a structured testing regimen.
At the end of this course, the participants will be able to:
- Apply OWASP's methodology to your web application penetration tests to ensure they are consistent, reproducible, rigorous, and under quality control.
- Analyze the results from automated web testing tools to validate findings, determine their business impact, and eliminate false positives.
- Manually discover key web application flaws.
- Use Python to create testing and exploitation scripts during a penetration test.
- Discover and exploit SQL Injection flaws to determine true risk to the victim organization.
- Understand and exploit insecure deserialization vulnerabilities with ysoserial and similar tools.
- Create configurations and test payloads within other web attacks.
- Fuzz potential inputs for injection attacks.
- Explain the impact of exploitation of web application flaws.
- Analyze traffic between the client and the server application using tools such as the Zed Attack Proxy and BurpSuite Pro to find security issues within the client-side application code.
- Manually discover and exploit Cross-Site Request Forgery (CSRF) attacks.
- Use the Browser Exploitation Framework (BeEF) to hook victim browsers, attack client software and the network, and evaluate the potential impact that XSS flaws have within an application.
- Perform two complete web penetration tests, one during the five sections of course instruction, and the other during the Capture the Flag exercise.
Who Should Attend
This course is targeted at:
- Security personnel whose job involves assessing networks and systems to find and remediate vulnerabilities
- Penetration testers
- Ethical hackers
- Defenders who want to better understand offensive methodologies, tools, and techniques
- Auditors who need to build deeper technical skills
- Red Team members
- Blue Team members
- Forensics specialists who want to better understand offensive tactics
- Incident responders who want to understand the mind of an attacker
ICT and SS Competency Framework
ICT and SS Competency Framework
As part of the ICTCF, this course falls under the Apps Development cluster and tagged to the following competencies:
- Apps Development: Application Security Testing
The course is mapped to the following job roles:
- Quality Engineer
- Cybersecurity Engineer
- Red Team Engineer
This course will cover the following topics in order of day:
- Introduction and Information Gathering
- Content Discovery, Authentication, and Session Testing
- Injection and XXE
- CSRF, Logic Flaws and Advanced Tools
- Capture the Flag
Full course fee
7% GST on nett course fee
|Total nett course fee payable, including GST
How To Register
Apply through your organisation's training request system
Your organisation's training request system (or relevant HR staff) confirms your organisation's approval for you to take the course.
Your organisation will send registration information to the academy.
Organisation HR L&D or equivalent staff can click here for details of the registration submission process.
The Digital Academy will inform you whether you have been successful in enrolment.