MODULE

1

Networking Fundamentals

This module covers elementary networking concepts necessary for application security testing.

OSI Model

Protocols and Port Numbers

IP addressing

Network Subnetting

image
MODULE

2

Linux Fundamentals

This module covers Linux commands that will be helpful while performing Vulnerability Assessment.

Working with directories

Working with files

Basic Linux tools

Changing Permissions

Changing Ownership

image
MODULE

3

Software Development

This module covers the software development processes, types of applications & web application architecture

Software Development Process

Software Development Models

Type of Applications

Web Application Architecture

image
MODULE

4

Cyber Security

This module covers basics of Cyber Security ecosystem which lays a strong foundation to perform Application Security testing.

3 Pillars of Cybersecurity

Cybersecurity Elements

Common Cyber Threats

Security Frameworks and Regulations

image
MODULE

5

Application Security

This module covers the nuances of Application Security in-depth

Need for Application Security

Attack Vectors

Threats to Applications

image
MODULE

6

Application Vulnerabilities

This module covers a detailed list of vulnerabilities which usually exists across the Applications.

Server-side Vulnerabilities

Client-side Vulnerabilities

Authentication and Authorization Issues

Local File Inclusion

Buffer Overflow

image
MODULE

7

OWASP TOP 10

This module covers the globally identified & recognized top 10 vulnerabilities.

Introduction to OWASP

Injection

Broken Authentication

Sensitive Data Exposure

Sensitive Data Exposure

XML External Entities (XXE)

Broken Access Control

Security Misconfiguration

Cross-Site Scripting (XSS)

Insecure Deserialization

Using Components with Known Vulnerabilities

Insufficient Logging & Monitoring

image
MODULE

8

Vulnerability Assessment

This module covers the process of identifying vulnerabilities, exploiting known weaknesses in the application & documenting the results.

Web Application Scanning

Application Penetration Testing

Introduction to DAST and SAST

Open Source and Commercial Tools and Techniques

Developing Security Testing Reports

image
MODULE

9

Application Hardening

This module covers various proactive remediation steps to ensure Application Security.

Hardening Components

Source Code Analysis

Mitigation of OWASP Top 10 Vulnerabilities

Configuring ModSecurity

Security DevOps

Web Application Firewall

image

Start your career in Cyber Security today!

Take your dreams to reality