Get in Touch

Course Outline

Module 1: Security concepts
Module 2: Risk management
Module 3: Phases of hacker attacks
Module 4: Penetration testing
Module 5: Man-in-the-Middle (MitM) networking attacks
Module 6: Overview of web technologies and frameworks
Module 7: Essential tools
Module 8: Bypassing client-side controls
Module 9: Authentication attacks
Module 10: Design and implementation flaws
Module 11: Web application attacks: Injection (A1)
Module 12: Web application attacks: Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) (A3/A8)
Module 13: Web application attacks: Broken authentication and session management (A2)
Module 14: Web application attacks: Insecure direct object references and missing function-level access control (A4/A7)
Module 15: Web application attacks: Security misconfiguration and sensitive data exposure (A5/A6)
Module 16: Web application attacks: Unvalidated redirects and forwards (A10)
Module 17: Logical flaws

 28 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories