Вы находитесь на странице: 1из 1

WEB APPLICATION

SECURITY ASSESSMENT
Level: Intermediate | Duration: 3 days

Objectives
Web applications are listed in the top ten security issues for years.
Web application assessment plays an important role to secure web 1. Understand the essentials topics underlying web applications;
applications from attacks. This course covers web applications security 2. Understand and learn the vulnerabilities and threats faced;
and its technologies. 3. Identify methods of exploiting these vulnerabilities;
The course will examine web architectures from penetration tester 4. Identify methods of protecting and mitigating these threats and
perspective. Participants will learn to start actual process of penetration attacks;
testing, starting with the reconnaissance and mapping phases and end by 5. Identify secure coding practices to address these weaknesses;
vulnerabilities discovery and exploitation.
6. Secure the web server in the organization infrastructure
Then, participants will identify and discuss ten (10) common web
application vulnerabilities and recommendations as well as related
mitigations and testing strategies that include secure coding methods. Target Participants
This course concludes by launching actual exploits against ten (10) 1. Management, Administrator, IT Security personnel who are in charged
common web application vulnerabilities found on testing applications. of security in their organizations
Participants are able to explore multiple exploit attacks.
2. Also applicable to individual who wants to learn about web application
security and experience some hands-on penetration testing exercises
3. This training requires some experience and this is not a programming
class

Modules
Day 1: Principles of Web Application Day 2: Common Threats and Defend Day 3: Web Application Cyber Attacks
Security Assessment
6. SQL Injection & Blind SQL Injection 14. SQL Injection & Blind SQL Injection
1. Web Application Basic 7. Cross Site Scripting (XSS) 15. Cross Site Scripting (XSS)
2. Web Application Security Assessment 8. Information Leakage and Improper 16. Information Leakage and Improper
Methodology Error Handling Error Handling
3. Reconnaissance & Mapping 9. Sensitive Data Exposure 17. Sensitive Data Exposure
4. Vulnerabilities Discovery 10. Cross Site Request Forgery 18. Cross Site Request Forgery
5. Exploitation 11. Failure to Restrict URL Access 19. Failure to Restrict URL Access
12. Remote File Include (RFI) 20. Remote File Include (RFI)
13. Broken Authentication & Session 21. Broken Authentication & Session
Management Management

For additional information, please visit www.cyberguru.my. You can also contact us at training@cybersecurity.my or call at 03 8800 7999

Corporate Office:
CyberSecurity Malaysia, Level 7, Tower 1, Menara Cyber Axis, Jalan Impact, 63000 Cyberjaya,
Selangor Darul Ehsan, Malaysia | Tel: +603 8800 7999 | Fax: +603 8008 7000
Email: info@cybersecurity.my | Customer Service Hotline: +61 300 88 2999 | www.cybersecurity.my

Вам также может понравиться