You are on page 1of 2

COURSE OUTLINE

ETHICAL HACKING PP
LIC
AT I O N S E
CU

RI
A

TY
Certified Application

C E RT I F I E D

TESTER •
Security Tester (CAST)


ET
HI G
C AL IN
H AC K

SPECIALIST-LEVEL COURSE Cost: £2,396.00 + VAT Duration: 4 days

This specialist four-day COURSE OVERVIEW WHO SHOULD ATTEND


web hacking course is for An advanced web hacking course This course is ideally suited to
designed for experienced penetration individuals that have been working
people in a wide range of testers, developers and security in an application testing (security
application development professionals who need to extend their assessment/administration) or developer
and testing roles. It is knowledge of hacking web applications. environment for some time and who
The course covers the syllabus for the have hands-on experience with web
designed to give you an
latest CREST Certified Web Application application security administration
in-depth knowledge of Tester (CCT App) exam and therefore and testing, including experienced:
how to identify security you will be expected to demonstrate zzPenetration testers

that you are able to find a range of zzApplication developers


vulnerabilities and an
security flaws and vulnerabilities, zzSecurity professionals
understanding of the including proving the ability to exploit
real risk that these and leverage the flaws to ascertain the PREREQUISITES
vulnerabilities pose by impact of the issues found. CAST is an advanced application
security training course and it is highly
exploiting them. THE SKILLS YOU WILL LEARN recommended that you have completed
zzYou will be led through a range of the 7Safe CSTP course, or already
state-of-the-art hacking tools and possess equivalent knowledge. It is
techniques to allow you to conduct important that you have knowledge of
a complete web application security networking and a practical experience
assessment of modern web application technologies
zzOnce able to identify and exploit (e.g. HTML, JavaScript, PHP, ASP,
vulnerabilities, you will learn a range of MSSQL, MySQL). Hands-on experience
defensive counter measures, allowing of modern hacking trends, tools and
you to develop applications that are technologies would also be
more resistant to attack and provide an advantage.
“Had a fantastic time on a better protection for data assets
the course, well delivered, WHAT QUALIFICATION
useful and eye opening to KEY BENEFITS WILL I RECEIVE?
say the least. Heading off This course will give you: Those delegates successfully passing
to take the CREST exam zzSecurity vulnerability identification the exam at the end of the course will be
shortly! Thanks for all your and avoidance awarded 7Safe’s Certified Application
zzAn industry recognised qualification, Security Tester (CAST) qualification.
help.”
CAST Delegate accredited by CREST and the IISP
zzEssential preparation for the CREST
MarketingSource Ltd
Certified Web Application Tester
(CCT App) exam

To find out if our cyber training is right for you, and to make a booking,
contact our education team on 01763 285 285 or email education@7safe.com
COURSE OUTLINE

ETHICAL HACKING PP
LIC
AT I O N S E
CU

RI
A

TY
Certified Application

C E RT I F I E D

TESTER •
Security Tester (CAST)


ET
HI G
C AL IN
H AC K

SPECIALIST-LEVEL COURSE Cost: £2,396.00 + VAT Duration: 4 days

SYLLABUS
1. Introduction to web 6. Web/application server issues 13. SQL injection
applications a. IIS/Apache/OpenSSL exploitation a. Introduction to SQL injection
a. HTTP protocol b. Oracle application server exploits b. Impact: Authentication bypass
b. Authentication (bypass exclusion list etc) c. Impact: Extracting data
c. Authorisation c. Insecure HTTP methods (Blind SQL Injection, UNION
d. Cookies d. WebDAV issues injection, OOB channels)
d. OS code execution (MS-SQL,
2. Authentication 7. Cross-site scripting MySql)
a. Types of authentication a. Types of XSS e. SQL injection within stored
b. Clear text HTTP protocol b. Identifying XSS procedures, parameterised
c. Advanced username c. Exploiting XSS statements
enumeration/brute force issues d. Secure cookie, HTTP-only f. Places where you never thought
d. Security through obscurity SQLI could occur
8. Advanced XSS g. Pitfalls in defending SQL injections
3. Authorisation a. Advanced XSS exploitation h. Fixing SQL Injections
a. Session management issues b. Pitfalls in defending XSS
b. Weak ACLs c. Fixing XSS 14. Malicious file uploads
c. Cookie analysis a. File uploads
9. Cross-site request forgery b. IIS zero-day
4. SSL misconfigurations a. Identifying/exploiting CSRF c. Hacking unprotected application
a. Attacks on SSL b. Complicated CSRF with POST servers
b. TLS renegotiation requests
c. MD5 collisions c. CSRF in web services 15. Vulnerable flash applications
d. Impact
5. Security
 problems with thick e. Fixing CSRF 16. Business logic bypass
client applications a. Authentication bypass
a. Insecure design 10. Session fixation b. Insecure coding
b. Echo Mirage, MiTM, a Cookie fixation c. Other logical flaws
replaying traffic etc. b. Faulty log-out functionalities
17. OS code execution
11. CRLF injection
a. Proxy poisoning 18. Remote/local file inclusion
7Safe
b. XSS with CRLF injection a. File inclusion
Global Innovation
and Technology Centre
b. OS code execution
Melbourn 12. Clickjacking
Herts, SG8 6DP a Impact of clickjacking and proof 19. Direct object reference
United Kingdom of concept
tel: +44(0) 1763 285 285 
education@7safe.com
www.7safe.com

To find out if our cyber training is right for you, and to make a booking,
contact our education team on 01763 285 285 or email education@7safe.com

You might also like