Our hands-on sessions teach candidates about web application security vulnerabilities by taking them step by step them through the process of a penetration test.
Our hands-on sessions teach candidates about web application security vulnerabilities by taking them step by step them through the process of a penetration test.
It’s also a useful course for those looking to break into Penetration Testing who want a first step on the journey.
Additionally, many security flaws can be subtle or difficult to spot if you’re not well versed in common vulnerability types and testing methods.
By using the 'hackers' point-of-view throughout the training course we allow those interested in developing a security testing capability to get started on that journey.
Mapping & Intelligence Gathering
Before the engagement begins, we will map the attack
surface to discover alive hosts, services, and versions.
As well as mapping application functionality
Vulnerability Discovery
We’ll demonstrate methods of finding and confirming
vulnerabilities to minimise false positives being
highlighted.
Proof of Concept & Confirmation
Where vulnerabilities are discovered a proof of concept
exploit will be created to demonstrate the potential
business risk. This ensures that false positives are
removed by manually confirming and demonstrating all
discovered vulnerabilities.
Exploitation Exploitation involves discovering weaknesses
within exposed applications and leveraging those
weaknesses to demonstrate as much business risk as
Want to know more about how our Hacking and Defending Web Apps security training course could benefit your organisation? Get in touch with one of our experts today for more info, or head over to Eventbrite to book your place on an upcoming session.
Secarma's expert training team regularly run hands-on security awareness courses across the UK and...
The Secarma testing team regularly run hands-on security training courses across the UK and...