Course Overview
You'll gain insight into the insecurities, vulnerabilities and exploits that lie within web applications so you can reduce the risk this poses to your business. This CREST Accredited course is based on OWASP Top 10 2017 and along with course Network Infrastructure Penetration Testing and Ethical Hacking will help students prepare for the CREST CRT examination.
100% online course - Study anywhere, anytime
CREST Accredited Training Course
1-2 months to complete
6 months, 24-hr remote access to a virtual lab allows you to learn, train and practice your skills in your own time.
Level: Intermediate
Trainer Online Support
Exam Code: CPT-WEB, Hours 2.5 - Type: Hands-On (Exam vouchers available only upon full payment)
ICSI|CWPT Certified Web Penetration Tester

Course Curriculum
- Introduction
- Important HTTP Methods
- Guided Exercise: Detecting HTTP Methods
- Guided Exercise: Detecting HTTP Methods (Video)
- Guided Exercise: Exploiting the PUT Method
- Guided Exercise: Exploiting the PUT Method (Video)
- Cookies
- Web Application Architecture
- OWASP Top 10
- Burp Proxy
- OpenVas
- Nikto, Wapiti
- Lab: Using Web Vulnerability Scanners
- Lab: Using Web Vulnerability Scanners (Solution)
- Nmap
- Metasploit Auxiliary Modules
- Lab: Scanning the Web Server
- Lab: Scanning the Web Server (Solution)
- Command Injection
- Guided Exercise: Looking for File Inclusions
- Guided Exercise: Looking for File Inclusions (Video)
- SQL Injection
- Lab: SQL Injection
- Lab: SQL Injection (Solution)
- Mitigation of Injection
- Authentication Protocols and Weaknessess
- Username Enumeration
- Attacking Tomcat’s Password with Metasploit
- Brute Forcing Credentials with Hydra
- Lab: Username Enumeration and Brute Forcing
- Lab: Username Enumeration and Brute Forcing (Solution)
- Mitigation of Broken Authentication
- Examples
- Lab: Finding Sensitive Data on Web Applications
- Lab: Finding Sensitive Data on Web Applications (Solution)
- Mitigation of Sensitive Data Exposure
- XXE External Entities
- Lab: XXE Exploitation
- Lab: XXE Exploitation (Solution)
- Mitigation of XML External Entities (XXE)
- Directory Traversal Overview
- Lab: Attacking Path Traversal
- Lab: Attacking Path Traversal (Solution)
- Mitigation of Broken Access Control
- Understanding Security Misconfiguration
- Using Burp to Detect Security Misconfiguration Issues
- Lab: Security Misconfiguration
- Lab: Security Misconfiguration (Solution)
- Mitigation of Security Misconfiguration
- Types of Cross Site Scripting
- Using Burp to Test for XSS Vulnerabilities
- Guided Exercise: Reflected Cross Site Scripting (XSS)
- Guided Exercise: Reflected Cross Site Scripting (XSS) (Video)
- Lab: Identifying XSS Vulnerabilities
- Lab: identifying XSS Vulnerabilities (Solution)
- Mitigation of Cross-Site Scripting (XSS)
- Examples
- Mitigation of Insecure Deserialization
- Examples
- Searching for Vulnerabilities
- Lab: Identifying Web App Vulnerabilities
- Lab: Identifying Web App Vulnerabilities (Solution)
- Mitigation of using Components with Known Vulnerabilities
- Examples
- Mitigation of Insufficient Logging and Monitoring
- Lab: Web Pen testing Various Web Applications
- How to register for the exam
- Extra Time: Using dirb
- Extra Time: WordPress Enumeration
What is included in this course
-
High-quality videos with in-depth content
-
Modular structure – student-directed path
-
Knowledge Checks at end of each module and the course
-
eBook
-
Lab Guide including video Guided Exercises and answer files
-
6 months 24x7 remote access to a virtual lab
-
Instructor email support
-
1 exam voucher - Online Exam Proctoring
-
Digital Certificate of Completion
-
Pass your Exam and share your Accredible Badge on LinkedIn