OVERVIEW OF THE COURSE WAPT
Web Application Penetration Testing Training focuses on preparing students for the real world of Web App Pen Testing through extensive lab exercises and thought-provoking lectures led by an expert instructor. We review the entire body of knowledge as it pertains to web application pen testing through a high-energy seminar approach. We offers Web Application Penetration Testing program to train and prepare IT Security Professionals.
The Web Application Penetration Testing course from Virtual Cyber Labs is a totally hands-on learning experience. From the first day to the last day, you will learn the ins and outs of Web App Pen Testing by attending thought-provoking lectures led by an expert instructor. Every lecture is directly followed up by a comprehensive lab exercise (we also set up and provide lab workstations so you don’t waste valuable class time installing tools and apps). Typical lab exercises consist of a real-world app that demonstrates a vulnerability commonly found in a web app.
You learn how to assess the application much as a black hat hacker would, and then exploit the app so that you can demonstrate the true risk of the vulnerability to the application owner. This can involve taking control of the application itself, downloading data from the application stores, or potentially using the app as a launching pad to attack unsuspecting visitors with a malicious script. Finally, the lab will follow up with remediation steps so that the application owner can properly close down the security hole for good.
CURRICULUM
- Module 1 : Web Application working Mechanism
- Module 2 : SQL injection, Google Dorks
- Module 3 : Hostile Subdomain Takeover
- Module 4 : WAF Bypass, Error Based SQL injection
- Module 5 : Blind SQL injection Misconfiguration
- Module 6 : SQL MAP , HAVIJ, SQL NINJA
- Module 7 : XSS part 1 & part 2
- Module 8 : File Inclusion Vulnerability
- Module 9 : Cross-Site Request Forgery
- Module 10 : NETSPARKER, NIKTO, WP-Scan
- Module 11 : NESSUS SCANNER, VEGA, NEXPOSE
- Module 12 : Security misconfiguration
- Module 13 : XMLRPC, Information Disclosure
- Module 14 : HTML Injection
- Module 15 : Source Code Disclosure
- Module 16 : Upload File Restriction Vulnerability
- Module 17 : Host Header Injection
- Module 18 : Session Fixation and hijacking
- Module 19 : Server Side Request Forgery
- Module 20 : Parameter Tampering
- Module 21 : Report Generating
- Module 22 : Conclusion at End