Specifically designed for Penetration Testers and Vulnerability Assessment professionals
NetCom Learning
1460 Broadway, 8th Floor, Room 8003
New York, NY 10036
Basic knowledge of OSes and file systems
Basic working knowledge of the Linux command line
Good understanding of web application working
Basic knowledge of Bash and/or Python scripting
Develop advanced skills in web application penetration testing methodologies and techniques.
Identify and exploit common web vulnerabilities such as SQL injection, XSS, CSRF, and SSRF.
Evaluate and mitigate risks related to misconfigurations, insecure components, and weak SSL ciphers.
Perform enumeration, scanning, brute-forcing, and dictionary attacks to uncover security flaws.
Analyze and exploit file-based vulnerabilities including LFI, RFI, arbitrary file upload/download, and tampering.
Understand and test for broken access control, IDOR, authentication bypass, and privilege escalation issues.
Conduct advanced exploitation techniques such as command injection, remote code execution, log poisoning, and session fixation.
Apply secure coding practices by analyzing source code, monitoring headers, cookies, and preventing clickjacking attacks.
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.