Advanced Web Attacks and Exploitation (WEB-300) is an advanced web application security review course. We teach the skills needed to conduct white box web app penetration tests. In WEB-300, students will learn how to: Perform a deep analysis on decompiled web app source code Identify logical vulnerabilities that many enterprise scanners are unable to detect Combine logical vulnerabilities to create a proof of concept on a web app Exploit vulnerabilities by chaining them into complex attacks This course can be taken as an option for skills specialization after completing PEN-200, but students should be comfortable reading and writing code in at least one language. Students who complete the course and pass the exam earn the Offensive Security Web Expert (OSWE) certification, demonstrating mastery in exploiting front-facing web apps. The OSWE is one of three certifications making up the new OSCE³ certification, along with the OSEP for advanced pentesting and the OSED for exploit development.
Learning Objectives
Performing advanced web app source code auditing Analyzing code, writing scripts, and exploiting web vulnerabilities Implementing multi-step, chained attacks using multiple vulnerabilities Using creative and lateral thinking to determine innovative ways of exploiting web vulnerabilities
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Exploitation Analysis
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.