Join us at APCO 2022 Conference & Expo, August 7-10 in Anaheim, CA.   Learn more.

Course Overview

Hackers routinely exploit web applications, especially as more services move to the cloud, despite the fact companies can easily fix most vulnerabilities within web applications before releasing their code to the wild. The “Web Application Exploitation” course teaches students about the most common web vulnerabilities (OWASP Top 10) in modern web applications, why they often exist, and several methods to test for their existence.

Each section has video lecture content introducing exploitation concepts to explain why the vulnerabilities exist, and how hackers exploit them. Each section also includes an immersive hands-on lab component, in which the student has the chance to exploit each vulnerability, using the vulnerable Mutillidae framework. Finally, the course encourages students to engage in a dynamic “capstone lab” designed to test the students’ ability to exploit a novel web application leveraging vulnerabilities identified in the OWASP Top 10.

Upon completion of this course, the student will understand how to identify and exploit common vulnerabilities present in modern web applications, and they will gain valuable real-world skills and abilities through a series of challenging hands-on web application exploitation exercises and scenarios. Students will understand the underlying issues enabling these vulnerabilities to exist, and the general principles for fixing them in a web application.

Course Outline
  • Introduction To OWASP Top Ten: A1 - Injection

  • Introduction To OWASP Top Ten: A2 - Broken Authentication

  • Introduction To OWASP Top Ten: A3 - Sensitive Data Exposure

  • Introduction To OWASP Top Ten: A4 - XML External Entities

  • Introduction To OWASP Top Ten: A5 - Broken Access Control

  • Introduction To OWASP Top Ten: A6 - Security Misconfiguration

  • Introduction To OWASP Top Ten: A7 - Cross Site Scripting

  • Introduction To OWASP Top Ten: A8 - Insecure Deserialization

  • Introduction To OWASP Top Ten: A9 - Using Components With Known Vulnerabilities

  • Introduction To OWASP Top Ten: A10 - Insufficient Logging and Monitoring

Course Introduction Video

Purchase Now


Course Access Duration

6 Months


Course Cost

$99


System Requirements

Download & review the minimum hardware and software requirements to ensure your setup is ready for the virtual training experience.

What Students Will Receive:

  • Expert-Led Instruction: Learn from top cybersecurity practitioners across every niche, gaining insights from industry leaders.
  • Extended Access: Enjoy six months of unlimited online access to your course through the On-Demand training platform, allowing you to learn at your own pace.
  • Hands-On Labs & Exercises: Apply your knowledge in real-world scenarios with interactive labs designed to enhance your practical skills.
  • Knowledge Reinforcement: Quizzes after each module help solidify key concepts and ensure retention.
  • Capstone Lab Challenge: Put your skills to the test with a final hands-on lab, demonstrating mastery of the course material.

With these resources, you'll have everything you need to confidently master the material and achieve your training goals!