Join us at the Web App Security professional workshop
Terminus System Information Security Workshops & Training Courses
LEARN HOW TO FIND YOUR OWN SYSTEMS VULNERABILITIES BEFORE THE BAD GUYS ATTACK THEM
How can you assess the security of your Web Apps?
Learn how to test the security of your web apps using techniques attackers use such as sniffing, cracking, spoofing, injecting, replaying and bypassing authentication. You will learn this hands-on at our Web App Security Workshop. This is one workshop series you wouldn’t want to miss!
This hands-on course focuses on tactics, techniques, and procedures used by both black hat attackers and penetration testers (white hat hackers).
The workshop starts with an overview of hacking incidents, trends, and attacker motivations. The course progresses to penetration testing methodologies. These often overly complicated methodologies, filled with an excessive number of steps, are simplified in this course with an emphasis on the penetration test objective.
Each hacking phase of the simplified methodology is demonstrated, discussed, and practiced. Attendees practice penetration testing in a fun and interactive environment with multiple live targets.
Is this Workshop for you?
If you have been considering upgrading your knowledge in Web App security, develop your skills in web application testing and enhance your organizations capability to secure your web applications, this workshop is for you.
Learn from the Pros on how to analyze the weakness in your wireless infrastructure, assess how it can impact your business if exploited, and know how to defend your web apps from malicious attacks.
THIS WORKSHOP IS A 1-DAY TRAINING CURRICULUM THAT PREPARES STUDENTS TO PROTECT THEIR WEB APPLICATIONS FROM MALICIOUS ATTACKS.
This workshop is an instructor-led, group-live instruction that includes relevant topics and hands-on practical exercises. Scenario-based practical exercises will be performed. Students will be shown how to select from a variety of open source (free) security tools and employ techniques to successfully secure their personal data.
This workshop can accommodate up to 15 students
- Review of the Testing Methodologies
- OWASP TOP 10 Web Vulnerabilities
- Attack Simulation Techniques and Tools for Web Server
- Attack Simulation Techniques and Tools for Web Application
- Attack Simulation Techniques and Tools Using Know Exploits
- Attack Simulation Techniques and Tools for Web Services
- Documentation & Presentation
- Session Management
- Cross Site Scripting
Insecure Direct Object Reference
- Security Misconfiguration
- Sensitive Data Exposure
- Missing functional level access control
- Cross Site Request Forgery
Using components with known vulnerabilities
- Unvalidated Redirects and Forwards
- SQL Injection
- Buffer Overflow
- Client-Side Attacks
For more information or if you would like to register, visit our web site www.terminus-system.com or email firstname.lastname@example.org