OWASP & Security Testing in DVWA Training
Level
BeginnerDuration
16h / 2 daysDate
Individually arrangedPrice
Individually arrangedOWASP & Security Testing in DVWA Training
The OWASP & Security Testing in DVWA training is a practical introduction to web application security based on one of the most popular testing platforms – Damn Vulnerable Web Application (DVWA). During the course, you will learn about key vulnerabilities from the OWASP Top 10 list, how to install and configure a testing environment, conduct penetration tests, and analyze their results. The training has a workshop format, allowing you to safely practice real-world attacks and defense methods in a controlled environment.
Who is this training for?
Developers who want to learn the most common security mistakes in applications
Software testers entering the field of security testing
System administrators and DevOps teams interested in strengthening web application security
People starting a career in cybersecurity
What You Will Learn
- To understand the mission and key projects of OWASP, including the OWASP Top 10 list
- To install and configure a testing environment (Kali Linux, DVWA)
- To perform penetration testing of web applications in low, medium, and high modes
- To detect and exploit common vulnerabilities: SQL Injection, XSS, CSRF, LFI/RFI, Path Traversal, Command Injection
- To use basic pentesting tools (Burp Suite, sqlmap, Hydra)
- To apply best practices for securing web applications and reducing risk
Training Program
-
Day 1
-
Module 1: Introduction to Web Application Security
- What OWASP is – mission, goals, and projects
- Overview of the OWASP Top 10 (latest version)
- The importance of security in the application lifecycle
-
Module 2: Preparing the Environment
- Installing Kali Linux (VirtualBox / VMware)
- Updating and configuring the system
- Installing and configuring DVWA (Damn Vulnerable Web Application)
- Running Apache and MySQL services
- Accessing DVWA in the browser
-
Module 3: Basics of Testing
- Introduction to penetration testing methodology
- Security levels in DVWA (low, medium, high)
- Working in a controlled laboratory environment
-
Day 2
-
Module 4: Key Web Application Vulnerabilities
- Path Traversal – accessing files outside the application directory
- Local File Inclusion (LFI)
- Remote File Inclusion (RFI)
- SQL Injection – manipulating database queries
- Command Injection – executing system commands
- Cross-Site Scripting (XSS)
- Cookie manipulation and session hijacking
- Brute-force attacks on application login
- Cross-Site Request Forgery (CSRF)
- File upload vulnerabilities
-
Module 5: Tools in Security Testing
- Kali Linux tools:
- Burp Suite
- sqlmap
- Hydra
- Browser and developer tools
- HTTP/HTTPS traffic analysis
- Kali Linux tools:
-
Module 6: Summary
- How to secure web applications
- Best practices in secure coding
- Further learning resources:
- OWASP Cheat Sheets
- DVWA documentation