Sie sind auf Seite 1von 4

Web Application Security Testing

Self-Paced Online | 90 Days Access | ‘Web Application Security Defender’ Cert Attempt

Aligned with OWASP Top 10 (2017) Risk, Testing Guide (v4) & Recommended Practices

Hack2Secure’s Self-Paced Online program on Web Application Security Testing provides required
exposure and understanding on different Web Security Risk and Attack vectors.
Scoped around OWASP Top 10 (2017) Web Application Security Risk and Security Testing Guide,
these intensive concept oriented sessions provide deep-dive on required testing tips and tricks to
evaluate, test and assess Web Application Security flaws.

Key Take Away


 Injection Attacks | SQL, Command, OS Inj.  Web Reconnaissance Methods
 Cross Site Scripting (XSS)  Google Hacking
 Cross Site Request Forgery (XSRF)  Spidering, Finger Printing & Scanning
 Broken Authentication & Access Control  Web Application Filters & Firewalls
 Session Management and related Attacks  Burp Suite & Zed Attack Proxy (ZAP)
 Vulnerable External Entities (XXE)  Nmap, NetCat, Recon-Ng
 Client Side Attacks  XSSer, SqlMap, Nikto, W3af

What You Will Receive Who Should Enroll


 Self-Paced Online Sessions  Professional
o 90 Days Access | Pre-Recorded videos o Looking to explore and adopt
 Soft Deliverables Web/Software Security Testing
Practices
o Slides, E-books, Reference Materials
o Looking to learn Web/Software
 WASD Cert Attempt Voucher Security Testing Tools, Techniques &
o 1 Attempt, 6 Months Validity Practices
o Globally Delivered and Proctored  Security Practitioners
v across PearsonVUE Test Centers o Looking to explore Web Security
concerns and attack scenarios
 Training Completion Certificate
 Fresh College Graduate / Student
 Opportunity to present Security
o Looking to learn skills & build
Article/Whitepaper career in Web Security Domain
o To be published On H2S Portal

WAST Program Enrollment: https://goo.gl/K9ZTcG


For more details, www.online.hack2secure.com | training@hack2secure.com
Program Scope & Curriculum
Module#1: Building the Base Module#5: Session Management
[Concepts, Processes & Methodologies]  “Sessions” & Tracking Methods
 Web Application Security: Introduction  Attacks on Sessions
 Proxy Servers o Fixation, Hijacking, Tampering
o Burp Suite, Zed Attack Proxy (ZAP)  Securing Cookies & Headers
 HTTP Protocol  Cross Site Request Forgery
o History, Versions, Status Codes o About, how it happens, Attack Scenarios
o Request & Response Analysis o Myths & Defensive Measures
 SSL/TLS Protocol  CSRF Tokens, Double Submitted
o PKI: Introduction, Digital Certificates Cookies
o About SSL/TLS, Handshake Process
o Testing methods Module#6: Injection Attacks
 About OWASP  SQL Query: Primer
o Top 10 Web Application Security Risk  SQL Injection (SQLi)
 Root Cause, Practical Analysis o About, Root Cause, Types & Analysis
 Recommended Best Practices o Different Attack Scenarios
o Application Security Testing Framework o Automated Tool: SQLMap
o Web Application Testing Guide  Command Injection:
 Component & Scope o About, Root Cause, Attack Scenarios
 [Local/Remote] File Inclusion Vulnerability
Module#2: Casual Leakage Points
[Reconnaissance] Module#7: Cross Site Scripting (XSS)
 Importance of Information Gathering  JavaScript: Primer
o DNS Protocol: Overview, Analysis & Scan  Same Origin Policy, Document Object Model
 Open Source Intelligence  XSS
 Exploring Google Search (Google Hacking) o Overview, Types & Analysis
o Keywords & Filters, Hacking Database o Different Attack Scenarios
o Automated Tool: XSSer
 Website Mirroring: Httrack
 HTML Injection
 Exploring Internet Connected Devices: Shodan
o About, Root Cause, Attack Scenarios
 Web Reconnaissance Tools
o TheHarvester, Recon-Ng
Module#8: Web Services & APIs
Module#3: Looking for Entry Point  Web Services
o About, Security Testing Requirements
[Scanning, Fingerprinting & Spidering]
 Explore JSON & AJAX
 Web Scanning: Identify Ports & Services
o Usage and Features
o NMap, Nikto
 Web Security Attacks with SOAP Queries
 Fingerprinting, Spidering/Crawling
o SQLi & Command Injection
 Web Application Fuzzing: Directory Browsing
 XSS in AJAX & JSON Objects
Module#4: Analyzing A.A.A. Concerns Module#9: Web Filters and Firewall (WAF)
 Authentication  Web Application Defenses: Filtering & Firewall
o About, Types, Different Schemes
 Filtering:
o Password Policies, Cracking Passwords
o .NET & ESAPI Filtering Options
 Authorization
 Web Firewall: Types, Detection, Attack methods
o About, Access Control Types
o Privilege Escalation Attack
o Insecure Direct Object References Module#10: Buffer Overflow Attacks
 Accountability  Stack & Heap Overflow
o About, Secure Logging Practices  Format String Vulnerability

For more details, www.online.hack2secure.com | training@hack2secure.com


Web Application Security Defender
Evaluate Your Web Security Essential Knowledge & Skills

Globally Available | Proctored | 180 mins. | 90 MCQ | Passing Grade: 60% | Exam Language: English

Web Application Security Defender (WASD) Certificate program evaluates individual's


implementation level skills required for Web Application Security Assessment. This program
ensures candidate's awareness on Application Security Challenges, Risk, Tools, Techniques and
methodologies along with hands-on practical level knowledge and skill-sets.

WASD is based on Application Security Industry Standards and Best Practices and ensures
Knowledge and Understanding of Secure Web Application Assessment requirements. It walks
through different phases/domains of Application Security Testing and provide required practical
strategies and methodologies to evaluate Security at every level.

Benefits Attempt to WASD Exam is


included as part of
 Validates your practical expertise and
knowledge in Web Application Security Web Application Security
Assessment Testing Self-Paced Online
 Get Global Recognition and Credibility
Training Program from
 Ensures Real Time skills required to han-
dle Web Application Security Risk Hack2Secure
 Demonstrate knowledge of Industry 1 Attempt | 6 months Voucher Validity
Standards and Best Practices
 Ensures effective skills to measure and Delivered globally at Pearson VUE
implement Security Controls Authorized Test Centres

To Schedule WASD Exam,


www.pearsonvue.com/hack2secure
For more details, visit www.hack2secure.com/wasd
www.hack2secure.com | certificate@hack2secure.com
About Hack2Secure
Hack2Secure excels in “Information Security” Domain and offers
customised IT Security programs, including Training, Services and
Solutions. Our programs are designed by industry experts and
tailored as per specific needs. We help students, professionals
and companies with knowledge, tools and guidance required to
be at forefront of a vital and rapidly changing IT industry.
InfoSec Training & Certification
Hack2Secure excels in delivering intensive, immersion security
programs designed to master practical steps necessary for
defending systems against the dangerous security threats.
Our wide range of fully customizable training sessions allow
individual to explore different aspects of Information Security as
per Industry requirements and Best Practices.
All H2S training programs are accompanied with globally
delivered and Proctored, Professional Certification Program with
PearsonVUE.

End-to-End InfoSec Services


Hack2Secure offers IT Security Professional Services to provide ways to stay ahead of Security
Threats through adaptive and proactive Security methods like
 Evaluating & Implementing Secure Software Development Life Cycle within an organization
 Secure Application Design Review, Threat Modeling
 Application Security Testing
 Network/Infrastructure Risk Assessment
 Consultation

hack2secure Hack2Secure featured as:


25 FASTEST GROWING CYBER SECURITY
COMPANIES IN INDIA
Source: The CEO Magazine, India

10 BEST SECURITY COMPANIES in INDIA: 2017


Source: Silicon Review Magazine, India
www.hack2secure.com
EXCELLENCE IN SECURITY TRAINING
PROGRAMMES
www.online.hack2secure.com Source: GDS Review Magazine

www.hack2secure.com | info@hack2secure.com

Das könnte Ihnen auch gefallen