Andaira Technology

 

Curso: Web Application Testing  


Certificación: N/A 

Acreditador: N/A

Duración: 2 días 

Idioma del material: Inglés 

Formato: Presencial 

Créditos: N/A

Introducción:

Testing plays a very important role in ensuring security and robustness of web applications. Various approaches – from high level auditing through penetration testing to ethical hacking – can be applied to find vulnerabilities of different types. However if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well planned and properly executed. Remember: security testers should ideally find all bugs to protect a system, while for adversaries it is enough to find one exploitable vulnerability to penetrate into it.

Attending this course will prepare software testers to adequately plan and precisely execute security tests, select and use the most appropriate tools and techniques to find even hidden security flaws. Practical exercises will help understanding web application vulnerabilities and mitigation techniques, together with hands-on trials of various testing tools from security scanners, through sniffers, proxy servers, fuzzing tools to static source code analyzers, this course gives the essential practical skills that can be applied on the next day at the workplace.

Audiencia:

Web application testers

Objetivos:

Individuals certified at this level will have demonstrated:

  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn client-side vulnerabilities and secure coding practices
  • Understand security testing approach and methodology
  • Get practical knowledge in using security testing tools
  • Get sources and further reading on secure coding practices

Prerrequisitos:

None

Material del curso:

You will receive the following as part of this course:

  • A participant handbook with reference materials
  • Virtual machine with the exercises

Exámen:

  • Exam Format: Paper-Based
  • Questions: 25 multiple-choice questions and open questions
  • Passing Score: 70%
  • Exam Duration: 120 minutes.
  • Proctoring: Physical proctoring

Requisitos técnicos:

A pre-installed exercise environment in the form of desktop virtual machine will be distributed on USB sticks for the participants at the start of the course.

Hardware and software specifications for the used host PCs are:

  • CPU equivalent to Core i5 with virtualization technology is recommended, minimum is Core i3 (or equivalent laptop processors)
  • 4GB is recommended, minimum is 2GB
  • At least 20 GB free space on the HDD.
  • Display resolution minimum 1024×768 (the larger the better)
  • Keyboard, mouse: any can be used as long as participants are familiar with them.
  • VMware Player minimal version is 3.2, preferred is 5.0.4.

Temario:

IT security and secure coding

  • Nature of security
  • IT security related terms
  • Definition of risk
  • Different aspects of IT security
  • Requirements of different application areas
  • IT security vs. secure coding
  • From vulnerabilities to botnets and cybercrime
  • Classification of security flaws

Web application vulnerabilities

  • SQL Injection
  • Other injection flaws
  • Cross-Site Scripting (XSS)
  • Broken authentication and session management
  • Cross Site Request Forgery (CSRF)
  • Insecure direct object reference
  • Unvalidated file upload
  • Security misconfiguration
  • Failure to restrict URL access
  • Transport layer security issues
  • Unvalidated redirects and forwards

Client-side security

  • JavaScript security
  • Ajax security
  • HTML5 Security

Security of RESTful web services

  • Security of RESTfulweb services
  • REST-related technologies for security
  • REST-related vulnerabilities

Security testing

  • Security testing
  • Introduction to security testing
  • System level hardening and mitigation techniques
  • Security testing methodology
  • Security testing techniques
  • Protection principles

Using security testing tools

  • Security testing tools - overview
  • Web vulnerability scanners
  • SQL injection tools
  • Public database
  • The most exploited flaw in Java
  • The actual mistake in java.util.Calendar – spot the bug!
  • Google hacking
  • Proxy servers and sniffers
  • Exercise – Capturing network traffic
  • Static code analysis
  • Summary