top of page
Web Hacking and Defense Course with OWASP Top 10 Vulnerabilities

OWASP-YN: Web Hacking and Defense Course with OWASP Top 10 Vulnerabilities

RM1,850.00Price

The majority of modern cyberattacks exploit just a handful of recurring web vulnerabilities—and most developers never get hands-on experience with them. The Web Hacking and Defense Course with OWASP Top 10 Vulnerabilities is a 2-day technical workshop designed to bridge that gap by teaching participants how real-world attacks happen and how to stop them using secure coding and testing practices.

 

Why this course matters:
Web apps are the #1 target for cybercriminals, and insecure code remains the weakest link. This training provides your team with the practical knowledge to secure applications before they go live.

 

Training Duration: 2 Days

  • Certificate Of Completion Available
  • Group Private Class
  • VILT Class Available
  • SBL-Khas Claimable

 

Download Course Outline

  • By the end of this course, participants will:

    • Explain the OWASP Top 10 vulnerabilities and their impact on web applications.
    • Identify the attack surface of web applications and common entry points for attackers.
    • Perform SQL Injection attacks to extract sensitive data from databases.
    • Execute Cross-Site Scripting (XSS) attacks to steal session cookies and manipulate user interactions.
    • Exploit Cross-Site Request Forgery (CSRF) vulnerabilities to perform unauthorized actions.
    • Conduct Broken Authentication attacks, including brute-forcing and session hijacking.
    • Implement secure coding practices to prevent vulnerabilities like SQL Injection and XSS.
    • Perform vulnerability assessments and penetration testing on web applications.
    • Understand the importance of secure development practices and continuous security Testing.
  • Day 1: Web Hacking Fundamentals


    Module 1: Introduction to Web Security and OWASP Top 10

    • Overview of web application security
    • Introduction to OWASP Top 10 (2021 or 2023 edition).
    • Explanation of the attack surface of web applications.

    Activity 1: Animation

    • How a web request flows between client, server, and database, and how attackers intercept or manipulate it?

    Activity 2: Animation

    • Discuss real-world breaches caused by OWASP Top 10 vulnerabilities (e.g., Equifax breach due to A03: Injection)


    Module 2: Injection Attacks (A03: Injection)

    • SQL Injection: Exploiting and extracting data from a vulnerable database.
    • Command Injection: Executing system commands via web inputs.

    Activity 3: Hands-on Labs & Exercise

    • Lab 1: Use OWASP Juice Shop or DVWA (Damn Vulnerable Web Application).
    • Exploit SQL Injection to dump database contents.
    • Example: ' OR '1'='1 in a login form.

    Activity 4: Animation

    • Show how malicious SQL queries bypass authentication and retrieve sensitive data.


    Module 3: Broken Authentication (A07: Identification and Authentication Failures)

    • Exploiting weak passwords, session hijacking, and brute-force attacks
    • Understanding multi-factor authentication (MFA) bypass techniques

    Activity 5: Animation

    • Demonstrate how session tokens are stolen and reused by attackers
    • Exercise: Implement a brute-force attack using Hydra or Burp Intruder.


    Module 4: Cross-Site Scripting (XSS) (A03: Injection)

    • Reflected XSS, Stored XSS, and DOM-based XSS.
    • Exploiting XSS to steal cookies and execute malicious scripts

    Activity 6: Hands-on Labs & Exercise

    • Use DVWA or OWASP Juice Shop to inject malicious scripts
    • Animation: Show how a malicious script is injected into a web page and executed in a victim's browser.
    • Exercise: Cookie session ID stealing.


    Module 5: Cross-Site Request Forgery (CSRF) (A01: Broken Access Control)

    • Exploiting CSRF to perform unauthorized actions on behalf of a user.

    Activity 7: Hands-on Labs & Exercise

    • Use DVWA to create a malicious HTML form that changes a user's password
    • Animation: Show how a victim is tricked into submitting a malicious request.
    • Exercise: Write a CSRF exploit using HTML and JavaScript.
    • Recap with Q and A session

     


    Day 2: Web Defence and Secure Coding


    Module 6: Secure Coding Practices

    • Input validation and output encoding.
    • Parameterized queries to prevent SQL Injection.
    • Using secure libraries and frameworks

    Activity 8: Hands-on Labs & Exercise

    • Fix vulnerabilities in a sample web application (e.g., OWASP Juice Shop).
    • Implement input validation and parameterized queries
    • Animation: Show how input validation blocks malicious payloads.


    Module 7: Web Application Firewalls (WAFs)

    • Introduction to WAFs and their role in protecting web applications.
    • Bypassing WAFs using obfuscation techniques.

    Activity 9: Hands-on Labs & Exercise

    • Use ModSecurity or a cloud-based WAF (e.g., AWS WAF).
    • Test WAF rules and bypass them using encoded payloads.
    • Animation: Show how a WAF detects and blocks malicious requests


    Module 8: Secure Authentication and Session Management

    • Implementing strong password policies and MFA.
    • Secure session management techniques (e.g., secure cookies, session expiration).

    Activity 10: Hands-on Labs & Exercise

    • Configure secure cookies in a web application.
    • Implement session timeout and regeneration.
    • Animation: how secure session management prevents session hijacking.
    • Exercise: Implement MFA


    Module 9: Security Testing and Tools

    • Introduction to security testing tools (e.g., Burp Suite, OWASP ZAP, Nmap).
    • Performing vulnerability assessments and penetration testing.

    Activity 11: Hands-on Labs & Exercise

    • Use OWASP ZAP to scan a web application for vulnerabilities.
    • Analyse the results and prioritize fixes.
    • Animation: how a vulnerability scanner identifies and reports issues.
    • Exercise: Perform a full penetration test on a sample application.


    Module 10: Capture the Flag (CTF) Challenge

    • Demo Hands-on CTF challenge covering selected topics.
    • Participants work in teams to find and exploit vulnerabilities in a simulated environment.

    Activity 12: Hands-on Labs & Exercise

    • Use OWASP Juice Shop or Hack the Box for the CTF.
    • Exercise: Participants document their findings and present their solutions.
    • Recap with Q and A session

Frequently Asked Questions

What is DAX used for in Power BI?

DAX is used to create calculated columns, measures, and advanced analytics logic in Power BI, enabling dynamic calculations based on filters and context.

Who should attend an advanced DAX course?

This course is suitable for Power BI users, Excel Power Pivot users, and BI developers who want to deepen their understanding of DAX and build complex analytical models.

Is DAX difficult to learn?

DAX can be challenging due to its evaluation context concepts, but with structured training and practice, it becomes manageable and highly powerful.

What are evaluation contexts in DAX?

Evaluation contexts define how DAX formulas are calculated, mainly through row context and filter context, which determine how data is filtered during calculations.

Will this course cover time intelligence in Power BI?

Yes. The course covers time intelligence functions such as running totals, year-over-year comparisons, moving averages, and semi-additive calculations.

Is this course HRDC Claimable?

Yes. This course is HRDC claimable, subject to HRDC approval and company eligibility requirements.

Can this course be customized for our organization?

Yes. The course content can be customized based on your data model, reporting requirements, and business scenarios.

What prerequisites are required for this DAX course?

Participants should have basic knowledge of data modeling in Power BI, Power Pivot for Excel, or Analysis Services Tabular models.


Contact Us

Enquiring as
Self Funded
Company Funded
bottom of page