This course is tailored for all security researchers, penetration testers and web designers who like to receive in-depth knowledge of web application security from a hacker’s perspective, our course is focused on offensive side and participants will also understand defenses while they step through the labs that are incrementally harder with more defensive features in place. this course is not one of those courses that covers OWASP top 10, it will start from very beginning and will reach out to the most cutting-edge threats and attacks in the world of web application security.
Feel free to download the syllabus to have an image of what you will be thought. Since this course is taught by some of the world’s most reputable actual hackers (and security bounty hunters), you will be taught practical working hacking stuff, not security materials available in a book, that can not hack into a single website. Visit the instructors page to get to know your teachers better.
The course requires basic programming skills, basic familiarity with web, and being interested in information security. We will provide you with out-of-class content that will boost you up to the rest of the class, if you lack the requirements.
The participant will be able to pwn 70% of the web systems on the Internet (of course you won’t do that, because it’s very bad), and will be able to perform advanced web security analysis and testing.
Thorough Custom-Made Cloud-Powered Labs
Step by Step Walkthrough on Attacks
Staff Responding to Every Question
This is our flagship course, and the defined price is $1999 for the entire package.
Students will receive a certificate of “Advanced Web Hacking” upon successful completion of the training. The training includes an exam at the end, and the score obtained in the exam will be included in the certificate.
WHAT YOU SHOULD BRING
Students are required to have a personal computer and spend enough time on the course and its labs and assignments. They are also required to be able to setup an Apache/PHP/MySQL for practice purposes on a virtual machine.