CURSO

WSHW Certification: Web Hacking Course

897.00

Course start / opening date : February 15, 2021 (take advantage of the early registration discount!)

Exposure to the Internet of companies and businesses, 80% is based on web applications ( either as an information page, SSL VPN accesses, file servers etc.).

There is no greater weapon for prevention than a good attack.

The student, in this course, will not only learn the techniques most used by cybercriminals, but also You will also learn how to mitigate these vulnerabilities.

The course has a detailed syllabus, and in addition, each module has a laboratory that is will make available to the student to carry out the attacks in a controlled way, which, after all, is how you learn, practicing.

Upon completion of the course, students will have the necessary knowledge to begin their career in cybersecurity in the field of pentesting, ethical hacking or penetration testing.

What the student will receive:

  • Files to connect to the VPN.
  • Internal Moodle central server where you will have all the syllabus, explanations and questionnaires to be done at the end of each lesson.

  • Access to laboratories with +30 hosts in order to put into practice what is learned during the course ( access for life ).
  • Regular updates and unlimited access to the course.
  • Access to the CTF only for students in which you will have more than 70 vulnerabilities to exploit, and find the flag (for 1 month).

  • 24x7 support to answer any type of question. These doubts will be resolved in a period of less than 24 hours.
  • Practical workshops at the end of each module.
  • At the end of the course, the student must choose the day and time to take the final exam, 100% practical .
  • WSHW Certification .

Reviews

There are no reviews yet.

Be the first to review “WSHW Certification: Web Hacking Course”

Your email address will not be published. Required fields are marked *

Temario

Módulo 1 – Introducción a la seguridad informática

Seguridad Informática en GeneralSeguridad Informática en General

Tendencia aplicaciones web

Pentesting VS Análisis de vulnerabilidades
Windows VS Linux

Kali Linux – Distro dedicada a Seguridad Informática

Módulo 2 – Recopilación de información

Whois Lookup

Descubriendo tecnologías utilizadas en sitios web

Recopilando información comprensiva sobre DNS

Descubriendo subdominios

Maltego

Nmap

Módulo 3 - Ataques básicos y conceptos passwords

Ataques de fuerza bruta – Diccionario

Html Injection

Verb Tampering

Métodos HTTP:
-TRACE
-OPTIONS
-PUT

BasicAuth (Apache)

Conceptos de contraseñas inseguras

Módulo 4 - Vulnerabilidades en la carga de archivos (uploads)

Solicitudes HTTP: GET y POST

Interceptando solicitudes HTTP (Burp)

Subida de archivos maliciosos vía:
1. Basic
2. Content-Type
3. Blacklist
4. Null Byte
5. Doble Extensión
6. GetImageSize

Mitigaciones vulnerabilidades carga de archivos (uploads)

Módulo 5: Top 10 OWASP

Que es OWASP

Ejecución de comandos (RCE)

SQL Injection

LFI (Local File Inclusion)

RFI (Remote File Inclusion)

Redirecciones (Redirects)

Mitigaciones

Módulo 6 - Frameworks

WordPress – Vulnerabilidades
-WPScan – Herramienta
-Remote Code Execution on WordPress

Joomla – Vulnerabilidades
-Joomscan – Herramienta

Módulo 7 – Herramientas Automatizadas

ZAP

Arachni

Acunetix

Burp Suite

Módulo 8 – Reporting

Presentación plantilla de informes

Creación de Informe Tipo

Conclusiones

Módulo 9 – Resumen del postgrado

Resumen del postgrado

Tips Examen

EXAMEN

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *