WEBAP - Web Application Security Training Course
Description:
This course provides participants with a comprehensive understanding of security concepts, web application architectures, and the frameworks employed by developers. This knowledge enables them to effectively exploit and safeguard targeted applications. In today’s rapidly evolving technological landscape, web applications are continuously exposed to hacking attempts around the clock. To defend against external threats, one must possess a deep understanding of all components that constitute a web application, including the frameworks, programming languages, and technologies involved in its development. A key challenge is that an attacker needs to discover only a single vulnerability to breach an application, whereas developers or system administrators must be aware of every potential exploit to prevent such intrusions. Consequently, creating a perfectly secure web application is exceptionally difficult, and most applications have some level of vulnerability. These weaknesses are frequently exploited by both cybercriminals and casual hackers. However, risks can be significantly reduced through strategic planning, secure development practices, rigorous web application testing, and proper configuration.
Objectives:
The goal is to equip you with the skills and knowledge necessary to understand and identify potential exploits in live web applications, as well as to exploit identified vulnerabilities. The insights gained during the identification and exploitation phases will enable you to protect web applications against similar attacks. Upon completion of this course, participants will be able to understand and identify the OWASP Top 10 vulnerabilities and apply this knowledge to enhance web application security strategies.
Audience:
Developers, police and other law enforcement personnel, defense and military personnel, e-Business security professionals, systems administrators, banking and insurance professionals, government agency staff, IT managers, CISOs, and CTOs.
This course is available as onsite live training in South Korea or online live training.Course Outline
Module 1: Security concepts
Module 2: Risk management
Module 3: Hackers attack phases
Module 4: Penetration testing
Module 5: Networking MitM attacks
Module 6: Overview of web technologies and frameworks
Module 7: Tools of the trade
Module 8: Bypassing client side controls
Module 9: Authentication attacks
Module 10: Design/implementation flaws
Module 11: Web application attacks: Injection (A1)
Module 12: Web application attacks: XSS/CSRF (A3/A8)
Module 13: Web application attacks: Broken authentication and session management (A2)
Module 14: Web application attacks: Insecure direct object references/Missing function level access control (A4/A7)
Module 15: Web application attacks: Security mis-configuration/Sensitive data exposure (A5/A6)
Module 16: Web application attacks: Unvalidated redirect and forwards (A10)
Module 17: Logical flaws
Open Training Courses require 5+ participants.
WEBAP - Web Application Security Training Course - Booking
WEBAP - Web Application Security Training Course - Enquiry
WEBAP - Web Application Security - Consultancy Enquiry
Testimonials (1)
Acceptance and cooperation of the coach to give the best thing
Nayef Hamouda - PSO
Course - WEBAP - Web Application Security
Upcoming Courses
Related Courses
Android Security
14 HoursAndroid serves as an open platform for mobile devices, including smartphones and tablets. It offers a wide array of security features designed to simplify the development of secure software; however, it lacks certain security aspects found in other mobile platforms. This course provides a comprehensive overview of these features while highlighting critical shortcomings related to the underlying Linux environment, file system, and general setup, as well as issues concerning permissions and other Android development components.
The curriculum details common security pitfalls and vulnerabilities in both native code and Java applications, along with recommendations and best practices for avoiding and mitigating them. Many discussed issues are illustrated with real-life examples and case studies. Additionally, the course offers a brief overview of how to utilize security testing tools to uncover security-related programming bugs.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about security solutions within Android
- Gain proficiency in using various security features of the Android platform
- Obtain information on recent Java vulnerabilities specific to Android
- Learn about common coding mistakes and strategies to avoid them
- Gain insights into native code vulnerabilities on Android
- Recognize the severe consequences of insecure buffer handling in native code
- Understand architectural protection techniques and their limitations
- Access resources and further readings on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursBuilding a secure networked application can be challenging, even for developers who have previously utilized various cryptographic components like encryption and digital signatures. To help participants grasp the role and application of these cryptographic primitives, the course first establishes a strong foundation on the core requirements of secure communication—including secure acknowledgment, integrity, confidentiality, remote authentication, and anonymity. It also outlines common threats that can compromise these requirements alongside real-world mitigation strategies.
Given that cryptography is a critical component of network security, the course examines essential cryptographic algorithms, including symmetric cryptography, hashing, asymmetric cryptography, and key agreement protocols. Rather than focusing on complex mathematical theories, the material is presented from a developer's perspective, featuring typical use-case examples and practical considerations such as public key infrastructure (PKI). Additionally, security protocols across various domains of secure communication are introduced, with a detailed examination of widely adopted protocol families like IPSEC and SSL/TLS.
The course addresses common cryptographic vulnerabilities associated with specific algorithms and protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and RSA timing attacks. For each issue, practical implications and potential consequences are explained without delving into deep mathematical details.
Finally, since XML technology is central to data exchange in networked applications, the course covers XML security aspects. This includes the use of XML in web services and SOAP messages, protection mechanisms like XML Signature and XML Encryption, and potential weaknesses in these measures. XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection are also discussed.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Comprehend the requirements for secure communication
- Learn about network attacks and defenses across different OSI layers
- Gain practical knowledge of cryptography
- Understand essential security protocols
- Recognize recent attacks targeting cryptosystems
- Gain insights into recent related vulnerabilities
- Understand security concepts within web services
- Access resources and further reading materials on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursThis three-day course provides foundational knowledge on securing C/C++ code against potential exploitation by malicious actors, focusing on vulnerabilities related to memory management and input handling. It emphasizes the core principles necessary for writing robust and secure software.
Advanced Java Security
21 HoursEven seasoned Java developers often do not fully master the range of security services provided by Java, nor are they always aware of the vulnerabilities that impact web applications built with Java.
This course introduces the security components of the Java Standard Edition (JSE) and addresses security issues related to the Java Enterprise Edition (JEE) and web services. Discussions of specific services begin with the fundamentals of cryptography and secure communication. Through a series of exercises, learners explore both declarative and programmatic security techniques in JEE, alongside transport-layer and end-to-end security for web services. Participants gain hands-on experience with the discussed APIs and tools through practical exercises.
The course also covers the most common and severe programming flaws in the Java language and platform, as well as web-related vulnerabilities. Beyond typical bugs, the security vulnerabilities explored include both language-specific issues and problems arising from the runtime environment. Each vulnerability and its corresponding attack is demonstrated through easy-to-understand exercises, followed by recommended coding guidelines and mitigation strategies.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to avoid them
- Understand the security concepts of web services
- Learn to use various security features of the Java development environment
- Gain a practical understanding of cryptography
- Understand Java EE security solutions
- Learn about typical coding mistakes and how to avoid them
- Receive information about recent vulnerabilities in the Java framework
- Acquire practical knowledge in using security testing tools
- Access resources and further reading on secure coding practices
Audience
Developers
Standard Java Security
14 HoursDescription
The Java language and the Java Runtime Environment (JRE) were engineered to eliminate many of the critical security vulnerabilities commonly found in languages such as C/C++. However, software developers and architects must not only master the positive security features available within the Java ecosystem but also remain vigilant about the persistent negative security risks inherent to Java development.
To set a solid foundation for understanding the purpose and mechanics of these security components, the course begins with an overview of cryptography fundamentals. Participants then engage in hands-on practical exercises to explore and utilize the relevant APIs firsthand.
Additionally, the curriculum thoroughly examines the most frequent and severe programming flaws specific to the Java language and platform. This includes typical errors made by Java developers as well as issues unique to the language and its environment. All identified vulnerabilities and their corresponding attack vectors are illustrated through clear, easy-to-understand exercises, followed by recommended coding guidelines and effective mitigation strategies.
Participants attending this course will
- Grasp core concepts of security, IT security, and secure coding
- Discover web vulnerabilities beyond the OWASP Top Ten and learn how to prevent them
- Gain proficiency in utilizing various security features of the Java development environment
- Develop a practical understanding of cryptography
- Identify common coding mistakes and learn strategies to avoid them
- Stay informed about recent vulnerabilities within the Java framework
- Access resources and further readings on secure coding best practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursToday, a variety of programming languages allow code to be compiled for the .NET and ASP.NET frameworks. While these environments offer robust security development capabilities, developers must understand how to apply architecture- and code-level techniques to implement desired security features, prevent vulnerabilities, and limit potential exploitation.
This course aims to equip developers with the skills to prevent untrusted code from executing privileged actions, protect resources via strong authentication and authorization, manage remote procedure calls and sessions, and explore diverse implementation strategies for various functionalities through numerous hands-on exercises.
The course introduces various vulnerabilities by first examining typical programming pitfalls associated with .NET. It then discusses ASP.NET vulnerabilities, analyzing how different environment settings impact security. Furthermore, the section on ASP.NET-specific vulnerabilities addresses not only general web application security challenges but also specialized issues and attack vectors, such as ViewState attacks and string termination attacks.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding practices
- Gain insight into web vulnerabilities beyond the OWASP Top Ten and learn how to avoid them
- Learn to utilize the various security features available within the .NET development environment
- Acquire practical knowledge in using security testing tools
- Identify typical coding mistakes and understand how to avoid them
- Stay informed about recent vulnerabilities in .NET and ASP.NET
- Access sources and further readings on secure coding practices
Audience
Developers
The Secure Coding Landscape
14 HoursThis course provides an introduction to fundamental security concepts, offering a comprehensive overview of vulnerability characteristics across diverse programming languages and platforms. It elucidates methods for mitigating software security risks throughout the software development lifecycle. While avoiding deep technical intricacies, the curriculum highlights significant and prevalent vulnerabilities in various software development technologies. It also addresses the challenges inherent in security testing, presenting applicable techniques and tools to identify potential issues within code.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding practices
- Comprehend web vulnerabilities affecting both server and client sides
- Recognize the severe consequences of improper buffer handling
- Stay informed about recent vulnerabilities in development environments and frameworks
- Learn to identify typical coding mistakes and understand how to prevent them
- Understand security testing approaches and methodologies
Audience
Managers
Secure coding in PHP
21 HoursThis course equips PHP developers with the essential skills required to fortify their applications against modern Internet-based threats. By using PHP-based examples that extend beyond the OWASP Top Ten, the curriculum covers a wide range of issues including various injection attacks, script injections, vulnerabilities in PHP session handling, insecure direct object references, file upload problems, and more. PHP-related vulnerabilities are categorized into standard types such as missing or improper input validation, incorrect error and exception handling, misuse of security features, and time- or state-related issues. Specific examples discussed include attacks like open_basedir circumvention, denial-of-service via magic floats, and hash table collision attacks. Participants will become familiar with the key techniques and functions needed to mitigate these risks.
Special emphasis is placed on client-side security, addressing issues related to JavaScript, Ajax, and HTML5. The course introduces several security-related PHP extensions, such as hash, mcrypt, and OpenSSL for cryptography, as well as Ctype, ext/filter, and HTML Purifier for input validation. Best practices for hardening are covered in the context of PHP configuration (php.ini), Apache settings, and server management in general. Additionally, the course provides an overview of various security testing tools and techniques available to developers and testers, including security scanners, penetration testing tools, exploit packs, sniffers, proxy servers, fuzzing tools, and static source code analyzers.
Both the introduction of vulnerabilities and configuration practices are reinforced with hands-on exercises. These exercises demonstrate the impact of successful attacks, show how to apply mitigation techniques, and introduce the use of various extensions and tools.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to prevent them
- Gain knowledge of client-side vulnerabilities and secure coding practices
- Develop a practical understanding of cryptography
- Learn how to utilize various security features of PHP
- Identify common coding mistakes and learn how to avoid them
- Stay informed about recent vulnerabilities in the PHP framework
- Acquire practical experience in using security testing tools
- Access resources and further reading on secure coding practices
Audience
Developers
Microsoft SDL Core
14 HoursThis comprehensive SDL core training provides an in-depth look at secure software design, development, and testing practices through the lens of the Microsoft Secure Development Lifecycle (SDL). The course offers a Level 100 overview of the fundamental building blocks of the SDL, followed by design techniques aimed at detecting and resolving flaws during the early stages of the development process.
Focusing on the development phase, the curriculum covers typical security-related programming bugs in both managed and native code. It presents attack vectors for the discussed vulnerabilities alongside corresponding mitigation techniques, all illustrated through hands-on exercises that offer participants engaging, practical hacking experiences. Following an introduction to various security testing methods, the course demonstrates the effectiveness of different testing tools. Participants will gain a deep understanding of how these tools operate by applying them to previously discussed vulnerable code through practical exercises.
Upon completion of this course, participants will:
Understand the core concepts of security, IT security, and secure coding
Gain familiarity with the essential steps of the Microsoft Secure Development Lifecycle
Acquire knowledge of secure design and development practices
Learn the principles of secure implementation
Understand security testing methodologies
- Access sources and further readings on secure coding practices
Target Audience
Developers, Managers
Security Testing
14 HoursHaving gained familiarity with vulnerabilities and attack vectors, participants will explore the overarching approach and methodology for security testing, along with techniques designed to uncover specific flaws. Effective security testing begins with information gathering regarding the system under evaluation (ToC), followed by comprehensive threat modeling to identify and prioritize all potential threats. This process culminates in a risk analysis-driven test plan.
Security assessments can be integrated at various stages of the SDLC. Accordingly, the course covers design reviews, code reviews, reconnaissance, and information gathering about the system, as well as testing implementation and hardening the environment for secure deployment. Detailed introductions to numerous security testing techniques are provided, including taint analysis, heuristics-based code review, static code analysis, dynamic web vulnerability testing, and fuzzing. A variety of tools capable of automating the security evaluation of software products are introduced, supported by hands-on exercises where participants execute these tools to analyze previously discussed vulnerable code. Additionally, real-world case studies are utilized to deepen understanding of diverse vulnerability types.
This course equips testers and QA professionals with the ability to effectively plan and execute security tests, select and utilize the most suitable tools and techniques to detect even concealed security flaws. The practical skills acquired can be immediately applied in professional settings the following day.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and understand how to mitigate them
- Study client-side vulnerabilities and secure coding practices
- Understand security testing approaches and methodologies
- Acquire practical knowledge in employing security testing techniques and tools
- Access resources and further reading materials on secure coding practices
Audience
Developers, Testers
Secure Web Application Development and Testing
21 HoursProtecting applications accessible via the web demands security professionals who are consistently informed about current attack methods and trends. While a wide array of technologies and environments facilitate comfortable web application development, it is crucial to recognize not only platform-specific security issues but also general vulnerabilities that persist regardless of the development tools used.
This course provides an overview of applicable security solutions for web applications, with a particular emphasis on understanding key cryptographic approaches. We will explore various web application vulnerabilities on both the server side (aligned with the OWASP Top Ten) and the client side, demonstrating relevant attacks alongside recommended coding techniques and mitigation strategies to prevent associated problems. The topic of secure coding concludes with a discussion of common security-related programming errors, such as flaws in input validation, misuse of security features, and poor code quality.
Testing plays a critical role in ensuring the security and robustness of web applications. Approaches range from high-level auditing and penetration testing to ethical hacking to uncover vulnerabilities of all types. However, to go beyond easily discoverable 'low-hanging fruits,' security testing must be meticulously planned and executed. Remember that while security testers must ideally identify all bugs to protect a system, an adversary needs to find only one exploitable vulnerability to gain access.
Practical exercises will deepen your understanding of web application vulnerabilities, programming mistakes, and, most importantly, mitigation techniques. Through hands-on experience with a variety of testing tools—including security scanners, sniffers, proxy servers, fuzzing tools, and static source code analyzers—this course equips you with essential practical skills ready for immediate application in the workplace.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to avoid them
- Gain knowledge of client-side vulnerabilities and secure coding practices
- Develop a practical understanding of cryptography
- Comprehend security testing approaches and methodologies
- Acquire practical knowledge in using security testing techniques and tools
- Stay informed about recent vulnerabilities across various platforms, frameworks, and libraries
- Receive resources and further readings on secure coding practices
Audience
Developers, Testers
DevOps Security: Creating a DevOps Security Strategy
7 HoursIn this instructor-led, live course in South Korea, participants will learn how to formulate an effective security strategy to address the challenges of DevOps security.
EC-Council Certified DevSecOps Engineer (ECDE)
28 HoursThe EC-Council Certified DevSecOps Engineer (ECDE) program is a practical course tailored to empower professionals with the expertise required to embed security measures throughout the DevOps lifecycle, facilitating secure software development from the initial planning phases through to deployment.
This instructor-led, live training session, available both online and onsite, targets intermediate-level software engineers and DevOps specialists aiming to incorporate security protocols into their CI/CD pipelines, thereby ensuring the delivery of compliant and secure code.
Upon completion of this training, participants will be equipped to:
- Grasp the core principles and best practices of DevSecOps.
- Secure all stages of the CI/CD pipeline through the utilization of automated tools.
- Apply secure coding standards and execute vulnerability assessments.
- Effectively prepare for the ECDE certification via practical labs and comprehensive reviews.
Course Format
- Engaging lectures and interactive discussions.
- Practical application of DevSecOps tools within simulated pipeline environments.
- Supervised exercises centered on secure development and deployment methodologies.
Customization Options
- To arrange a customized training session aligned with your team’s specific workflows or toolchains, please reach out to us.
How to Write Secure Code
35 HoursThis Course in South Korea aims to assist in the following:
- Help Developers master the techniques of writing Secure Code
- Help Software Testers assess application security before deployment to the production environment
- Help Software Architects understand the risks associated with applications
- Help Team Leaders establish security baselines for developers
- Help Web Masters configure Servers to prevent misconfigurations
Secure Developer Java (Inc OWASP)
21 HoursThis course explores secure coding principles and practices for Java, utilizing the testing methodology of the Open Web Application Security Project (OWASP). The OWASP community is an online hub dedicated to providing freely accessible articles, methodologies, documentation, tools, and technologies focused on web application security.