קורס Cyber & Information Security

Web Application Hacking Course

CTR-904

carmel-website
carmel website
carmel-website
carmel-website

About this course

Web applications are the front-end servers that we connect to get our daily services: mail, WhatsApp, google, integrate you name it.

Because they are in the front we connect to them via public internet network.

Because there are specific rules how they are expose they are extremely vulnerable.

Do you know who those servers are also exposed to beside us? To others, which is everybody else include the hackers.

The hackers are people with specific agenda to target and damage those servers, those services using vulnerabilities that they explore every day.

IT security is one of the most evolving expertise in the last few years.

People who oversee securing the web services are dealing with the highest level of security knowledge.

IT security people must be sharp, on top of things and very creative.

If the hackers are exploring new vulnerabilities, IT security must explore new ways to secure the servers and their services.

This Course will put a spotlight on the two main tasks:

1) maintain servers security

2) check for vulnerabilities that hackers can exploit.

In this course we will learn both secure and check.

Audience profile

This course is for experienced information technology (IT) specialists. This is a step-up path to higher level of IT management and IT security.

At course completion

After completing this course, participates will be able to:

  • Create a lab with your main corporate applications
  • Secure the lab with best practices.
  • Test your lab for vulnerabilities.
  • Explore new ways to secure your lab
  • The lab represents your real corporate servers environment.

Course details

At the end of each module there will be a practice lab and exercises.

Each module will have:

2 lessons, one practice lab and questions and answers from the specific module.

Module 1 – Terms and acronyms

In this module we go over technicals terms that are critical to understand further topics of: security. These terms also comes from the world of network and system. Not deep dive but highly technical overview of those terms.

Module 2 – The Lab

In this module we will get to know the course lab and how to create a lab.

Module 3 – Common Attacks

In this module we will do both, secure our lab and test for vulnerabilities.

We will simulate few lnown attacks on web applications servers and data bases

Module 4- Best practices

In this module we will learn how to scan our servers envirnment and locate main security vulnerabilities and secure them with best practices provided by the companies represented in our lab.

Module 5 – Vulnerabilities check and management.

After you understood the lab environment the risks and vulnerabilities and you are ready to initiate the results and best practices in your production environment.

Module 6- building the plan

In this module we will learn how to gather top management and enroll them to build a plan to explain and demonstrate the current risks in your server environment and the results of your lab.

This module will explain how to build a plan to secure your environment.

Prerequisites

  • Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
  • Familiar with fundamentals IT servers: Active directory, DNS, DHCP, Group Policy, and IIS etc
  • Familiar with basic Linux skills: Ubuntu, Apache etc.
  • Familiar with basic security skills: antivirus, security updates, personal fire wall.
  • Familiar with basic security regulations and secure information.
  • Passing questionnaire.

Fill in the details and we will get back to you as soon as possible

Why choose Carmel Training?

We offer quality solutions for professional training that save you time and resources, and provide you with the tools to take your skills one step further!

carmel website

leading lecturers

Have training experience
and practical rich

carmel website

coming to you

You determine the location of the course and the date

carmel website

theory and practice

Study materials and laboratories
Microsoft official available in the cloud

carmel website

customized program

Full and personal adjustment to the requirements and needs of the organization

You might also be interested..

Web Application Hacking Course

Skip to content