Day 1 — What can go wrong?
The first section of day one will explain the various security holes that can exist in a web-based application, using both technical explanations and real-world examples of these flaws. You will learn why certain vulnerabilities are a serious threat to your business, and you will learn why these vulnerabilities work.
Day 2 — Attack and Defense
The attack and defense section of this course focuses purely on detecting vulnerabilities (as an extension to day 1), and how one could exploit these vulnerabilities.
Students will be given practical tests, to detect and exploit vulnerabilities, and group discussion on results and how one could potentially fix these vulnerabilities.
Students will need to bring a laptop capable of connecting through Ethernet. Operating system can be Windows, Linux, or Mac OS X.