WAHS: Web Application Hacking and Security
Summary
Web Application Hacking and Security has challenges derived from the engaging iLab environments of EC Council – from Certified Ethical Hacker (CEH) to a Certified Penetration Testing Professional (CPENT); from Certified Application Security Engineer (CASE) .Net to Java. But Web Application Hacking and Security goes beyond this to more difficult scenarios as you advance through each problem.
Web Application Hacking and Security is like a Capture-The-Flag (CTF) competition meant to test your hacking skills. But you can keep on trying until you achieve the goal. Test your skills and work alone to solve complex problems or follow the instructor as they do a walkthrough to help you learn Web Application Hacking and Security.
Who should join this Course?
If you are tasked with implementing, managing, or protecting web applications, then this course is for you. If you are a cyber or tech professional who is interested in learning or recommending mitigation methods to a myriad of web security issues and want a pure hands-on program, then this is the course you have been waiting for.
- Penetration Tester
- Ethical Hacker
- Web Application Penetration
- Tester/Security Engineer
- Auditor
- Red Team Engineer
- Information Security Engineer
- Risk/Vulnerability Analyst
- Vulnerability Manager
- Incident responder
Prerequisites
- Basic understanding of Internet and Web technologies
- Fundamental knowledge of HTTP/HTTPS protocols
- Familiarity with web development languages like HTML, CSS, JavaScript, or PHP
- Basic understanding of SQL and database structure
- Familiarity with security concepts and hacking techniques
- Previous cybersecurity experience or certifications can be beneficial.
Course Outline
You will learn about application vulnerabilities and web application hacking. Even though this will prove useful for other CTF contests, and in cracking VVMs, it will be even more useful to your career as you learn to defend your applications and progress to Web Application Hacking and Security.
- Advanced Web Application Penetration Testing
- Advanced SQL Injection (SQLi)
- Reflected, Stored, and DOM-based Cross-Site
- Scripting (XSS)
- Cross Site Request Forgery (CSRF) – GET and
- POST Methods
- Server-Side Request Forgery (SSRF)
- Security Misconfigurations
- Directory Browsing/Bruteforcing
- CMS Vulnerability Scanning
- Network Scanning
- Auth Bypass
- Web App Enumeration
- Dictionary Attack
- Insecure Direct Object Reference Prevention
- (IDOR)
- Broken Access Control
- Local File Inclusion (LFI)
- Remote File Inclusion (RFI)
- Arbitrary File Download
- Arbitrary File Upload
- Using Components with Known Vulnerabilities
- Command Injection
- Remote Code Execution
- File Tampering
- Privilege Escalation
- Log Poisoning
- Weak SSL Ciphers
- Cookie Modification
- Source Code Analysis
- HTTP Header modification
- Session Fixation
- Clickjacking
Exam and Certification:
The Web Application Hacking and Security exam assesses candidates’ skills and proficiency on a broad spectrum of OWASP Top-10 web application vulnerabilities and attack vectors. Web Application Hacking and Security Exam is a fully online, remotely proctored practical exam that challenges candidates through a grueling 6-hour performance-based, hands-on exam.
The exam focuses on candidates’ proficiency in performing a web application security assessment in real-life stressful scenarios. Candidates who score more than 60% will earn the Certified Web Application Security Associate certification, candidates who score more than 75% will be awarded the Certified Web Application Security Professional certification and candidates who score more than 90% attain the prestigious Certified Web Application Security Expert certification!