Security in Testing Training
Level
IntermediateDuration
20h / 3 daysDate
Individually arrangedPrice
Individually arrangedSecurity in Testing Training
Web application security is a key aspect in designing, developing, and maintaining web applications. These protections are extremely important because the Internet is full of threats, and attackers constantly try to exploit various vulnerabilities in applications for illegal purposes. Web application security is an ongoing process that requires attention at every stage of application development and operation.
Who is this training for?
For software testers who want to expand their knowledge and skills in web application security
For individuals interested in a career as a junior web application pentester
For current web application developers who want to expand their knowledge and skills in web application security
Participants
- Basic programming skills in Java, PHP, or .NET
- Basic knowledge of JavaScript
- Basic knowledge of SQL
- Basic knowledge of IT solution architecture
- Basic knowledge of web applications
- Basic understanding of operating systems and computer networks
What You Will Learn
- This training provides participants with insight into various aspects of web application security as well as skills in identifying and addressing vulnerabilities.
Training Program
-
Introduction to Web Application Security
- Web application security fundamentals
- Web application architecture
- OWASP Top 10 (2021)
- CWE / CVE / CVSS – vulnerability classification and scoring
-
Information Gathering and Enumeration
- Information gathering techniques
- Enumeration methods
- Tools used in reconnaissance
- Network traffic analysis
- Protocols comparison:
- FTP vs HTTP vs HTTPS
- HTTP request manipulation
- GET request modification
- POST / PUT / DELETE request modification
-
Vulnerability Analysis – Core Issues
- SQL Injection (SQLi) – SQL and NoSQL
- OS Command Injection (OSi)
- Unrestricted File Upload (UFU)
- Data leakage
- Log content exposure
- Open source code leaks
- Low hanging fruit vulnerabilities
- Lack of proper error handling
-
Network Traffic Security
- TLS / SSL fundamentals
- HTTP security headers
- Same-Origin Policy (SOP)
- Cross-Origin Resource Sharing (CORS)
-
Advanced Vulnerability Analysis (Attack, Defense, Examples)
- Cross-Site Scripting (XSS)
- XML vulnerabilities
- XML External Entity (XXE)
- XML Denial of Service
- Cross-Site Request Forgery (CSRF)
- Local File Inclusion (LFI)
- Remote File Inclusion (RFI)
- Directory Traversal (DT)
- Brute Force (BF)
- Insecure Direct Object Reference (IDOR)
- Server-Side Template Injection (SSTI)
- Server-Side Request Forgery (SSRF)
- Denial of Service (DoS) and Application DoS
- Vulnerable and outdated components
-
API Security
- Authentication and authorization methods
- Common API security vulnerabilities
- OWASP API Security Top 10 (2019)
-
Fuzzing and Specialized Testing
- Web application fuzzing
- Mobile application security basics
- Using proxies in security testing
- Reverse engineering fundamentals