DIS10.5 Critical Web App Security Certification

2

 

 

DIS10.5 : TOP 20 Critical Web Application Vulnerability Certification (DWAV20 Standards)

 

DIS10.5: WEB APP SECURITY (DIS Top 20 Critical Web Application Vulnerabilities) course will help candidate get deep information about web applications security process. Web applications security includes various vulnerabilities like Sql Injection, Php Injection,XSS,CSRF, Indirect object reference and many more. This course will help student to get instant job in the Cyber Security.(25 Credits towards DIS10 Diploma)

 

COURSE CONTENT

DWAV20.1 : SQL Injections Flaws
DWAV20.2 : Cross Site Scripting Flaw
DWAV20.3 : Source Code Disclosure Flaw
DWAV20.4 : OS Command Injection Flaw
DWAV20.5 : Broken Authentication and Session Management
DWAV20.6 : File Upload Vulnerability (Dangerous File Upload)
DWAV20.7 : CSRF – Cross Site Request Forgery
DWAV20.8 : Sensitive Data Exposure
DWAV20.9 : Insecure Direct Object Reference
DWAV20.10 : Local file Inclusion and Remote File Inclusion(LFI and RFI attack)
DWAV20.11 : Directory Traversal Attack
DWAV20.12 : Insecure Transport Level Communication
DWAV20.13 : Information Exposure Through an Error Message
DWAV20.14 : Invalid URL Redirection Flaw
DWAV20.15 : Hard-coded Credentials in Static Code
DWAV20.16 : Security Mis-Configuration
DWAV20.17 : Missing Authorization and Authentication for Critical Functions
DWAV20.18 : Session Fixation
DWAV20.19 : Weak Data Encryption
DWAV20.20 : Information Leakage

 

HANDS ON PRACTICAL PROJECT

 

DWAV20.1 : Sql Injections Flaws : Login Authentication Bypass,Blind Sql Injeciton Manual and Automated using Havij,SQLMAP,Html Injection.
DWAV20.2 : Cross Site Scripting Flaw : Reflected and Stored XSS using Manual and Tool Based : Using Burp Suite
DWAV20.3 : Source Code Disclosure Flaw : Manual Process and File Inclusion
DWAV20.4 : OS Command Injection Flaw: On DVWA (Damn Vulnerable Web Application) and Metasploitable
DWAV20.5 : Broken Authentication and Session Management : DVWA -Damn Vulnerable Web Application, Samurai OS
DWAV20.6 : File Upload Vulnerability (Dangerous File Upload) Live Practical Based Example
DWAV20.7 : CSRF – Cross Site Request Forgery
DWAV20.8 : Sensitive Data Exposure : Live WebSite
DWAV20.9 : Insecure Direct Object Reference: Instructor Special
DWAV20.10 : Local file Inclusion and Remote File Inclusion(LFI and RFI attack): BURP SUITE
DWAV20.11 : Directory Traversal Attack Traversing Directories on a Web Site
DWAV20.12 : Insecure Transport Level Communication: Weak SSL Version Detection
DWAV20.13 : Information Exposure Through an Error Message
DWAV20.14 : Invalid URL Redirection Flaw
DWAV20.15 : Hard-coded Credentials in Static Code
DWAV20.16 : Security Mis-Configuration
DWAV20.17 : Missing Authorization and Authentication for Critical Functions
DWAV20.18 : Session Fixation
DWAV20.19 : Weak Data Encryption
DWAV20.20 : Information Leakage

 

BENEFITS OF ACHIEVING THIS CERTIFICATION

 

Web Application attack tools, Dummy web applications for practicals.ALL Virtual Machines and Virtual Environment for Students who attend training’s. Special web application for the students for web application attacking purpose.
DVD with tools , Videos , Practice Tests , Virtual Labs.
Audio and Video Tutorials which will help in doing practical sessions at your study desk also.
Written Test Voucher Code
Online Test Voucher Code’

 

Pay Now

 

To confirm/register your seat please send us a complete refundable deposit as a registration fee of 500$ USD by any of the following methods:

 

»  NEFT/RTGS to:
hdfc logo
Acc. Name : “Bytecode Cyber Security Pvt Ltd”
Account No. : 00922560003606
IFSC Code : HDFC0000092
Swift Code : HDFCINBB
  Cash/Cheque/Demand Draft Deposit to:
hdfc logo
Acc. Name : “Bytecode Cyber Security Pvt Ltd”
Account No. : 00922560003606
Branch :Greater Kailash – 1,Delhi
IFSC Code : HDFC0000092
Swift Code : HDFCINBB
paypal logo»
Paypal Transfer :
Our paypal account id is :
register@bytecode.in
(Paypal payments will payable a surcharge of 4%.)
credit card logo
Credit/Debit cards & Net Banking payments
 

 

 

Note: Pay the rest amount by cash, card or students Cheque on arrival at the center.

          All of the online payments will payable a surcharge of $4 USD.

Once you done the payment, please send us a scanned copy of NEFT/RTGS/Cash/Cheque/DD receipt and please forward a scanned copy of your passport and visa to our concern department at deposit@bytecode.in

 

Address:

72-B,

III Floor,Vijay Block,

Vikas Marg, Laxmi Nagar,
New Delhi – 110092 (India)

Email: info@bytecode.in

Contact: 011-64601115