Web Application Security
"Web Applications Security" in hands-on hacking format is an eye-opening course for developers and those who have to keep web sites up and running on daily basis
Course duration : 4 days of instructions heavily mixed with hands-on labs.
Group size : 12 participants maximum
Target audience : WebApp developers, maintainers, web server or hosting providers/administrators, information security specialists and managers, testers
Web Application Security course consists of two modules:
- Server-Side Attacks
- Client-Side Attacks
It's possible to order the modules on separate weeks (2 days + 2 days).
Price : 4 days, 2400 EUR + VAT
Information and registration: info@clarifiedsecurity.com
Trainers
Trainers are Elar Lang and Marko Belzetski .
Elar is an experienced PHP developer who enjoys researching web attacks and security. In Estonian IT College he wrote his diploma on "PHP Application Layer Attacks - mechanisms and protection" and in Tallinn University of Technology his master thesis on "Web Application Security - hands-on training". Both schools were graduated with honors ( cum laude ), of course. He is constantly improving and working on his trainings to keep them up to date and for giving the best trainings possible. In March 2017 he rounded up 2000 hours of WAS training given since 2012 March launch and the count is growing fast.
Marko joined the team in August 2016. His focus lies in Android and web application penetration testing. He is also one of the main lecturers of our 4-day Web Application Security course. Previously he has worked in finance and business support along with some freelance web application development. Marko has a diploma of professional higher education in IT systems development from Tallinn Technical University. His thesis on the subject of Android IPCs was awarded best thesis in the BSc category of his graduation year. He also holds a bachelor's degree in business administration from Northwood University, which he graduated magna cum laude.
Training methods
Our course employs a dynamic blend of theoretical concepts and hands-on application. Through interactive lectures, engaging discussions, and immersive labs, participants actively experience web application security. Everyone, regardless of their background, will successfully complete the labs, either independently or with guidance from our expert instructors. By placing you in the attacker's shoes within our dedicated lab environment, we transform theoretical knowledge into practical skills. Instructors leverage real-world case studies and storytelling from penetration tests to provide a vivid and relatable learning experience. This approach ensures that participants not only grasp the intricacies of security principles but also gain the practical know-how to navigate and secure real-world scenarios.
Ideology of this course
At the core of our course is the belief that understanding the offensive side is paramount to effective defense. The "Attack to Defend" motto encapsulates this ideology, emphasizing the importance of practical knowledge. We go beyond traditional approaches, challenging outdated terms and providing insights into cutting-edge techniques. The course is designed not just to teach security principles but to instill a proactive mindset, empowering you to anticipate and thwart potential threats.
Contents of this course
Web Application security essentials (4 parts, 8 lectures with practical demos and exercises for each vulnerability, including complex attack scenarios):
Server-Side attacks
|
Client-Side attacks- Browser security policies and terminology- Cross-Site Script (XSS) - what it is and what it is not - Web Content Injection attacks (HTML injection, JavaScript injection) - URI encoding, URL manipulation - Referrer, Referrer-PolicyContent Execution Attacks -Web Content Execution from uploaded files (HTML, XMl, SVG) - Serving files, Content-Disposition header - Using 3rd party content - HTTP response headers (Content-Security-Policy (CSP), X-Content-Type-Options, Strict-Transport-Security) - Browser storages - Cookies, setup and parameter nuances - Web Storage API - Session, session hijacking and session fixation attacks - Client-Side Request Forgery attacks - Cross-Origin Resource Sharing (CORS), CORS-safelisted and pre-flight requests, related headers - UI Redress Attacks (ClickJacking) |
* All attacks have hands-on demos, exercises and “lessons learned” from our pentesting services.
Intended outcome
By the end of this course, participants will possess the expertise to architect inherently secure software, integrating robust defense mechanisms seamlessly into the development process. Security will be ingrained as a proactive element, enabling participants to identify vulnerabilities early and build resilient applications from the ground up. Whether you're a security enthusiast, developer, or IT professional, this program equips you to confidently create digital landscapes where security is not an addition but an integral part of the development lifecycle.
Delivery
We can deliver on-site at group pricing anywhere in the world where decent Internet connection is available. Ask us for the group pricing or for times and locations of our public courses. Public groups are currently available directly or via partners in Estonia: BCS Koolitus , Nordic Koolitus .
Feedback
Elisa Eesti AS
29 FEB 2024
CO-Founder & CTO of Scoro
27 JAN 2017
Head of Development,
Helmes AS
31 JUL 2017