Web Application Penetration testing: A Beginner is Guide

WAP Course Introduction

This 2-day intensive course is designed for beginners, providing a thorough introduction to the core principles of web security and penetration testing methods. Participants will acquire crucial theoretical understanding and practical skills necessary for conducting penetration testing on web applications. During the course, participants will fully engage in the field of web security, exploring vulnerabilities and learning how to secure web applications against potential cyber threats.

WAP Course Objectives

    • To understand the fundamental principles of web application security, with a focus on the OWASP Top 10 vulnerabilities.
    • To learn how to use various penetration testing tools and techniques essential for assessing web application security.
    • To gain the knowledge of web application vulnerabilities such as SQL injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), and other related security threats.
    • To acquire practical skills by conducting hands-on penetration testing on web applications, identifying security flaws, and exploiting vulnerabilities, including those found in the OWASP Top 10.

Target Group

    • Junior penetration tester
    • IT auditor
    • Developer
    • IT operation
    • General attendees (ผู้สนใจทั่วไป)

Course Outline of WAP

Day 1
    • Introduction to Web Application Penetration Testing
    • What is Web PenTest and Type of PenTest
    • Writing Pentest Report
    • OWASP Web Top 10
        - Broken Access Control
        - Cryptographic Failures
        - Injection
        - Insecure Design
        - Security Misconfiguration
        - Vulnerable and Outdated Components
        - Identification and Authentication Failures
        - Software and Data Integrity Failures
        - Security Logging and Monitoring Failures
        - Server-Side Request Forgery
    • Web Application PenTest Tools
    • BurpSuite Basics
    • Setting Up the PenTest Environment

Day 2
    • SQL Injection
    • Cross Site Scripting
    • Cross Site Request Forgery
    • File upload Vulnerabilities
    • Security Header
    • Broken Authentication
    • Broken Access Control Vulnerability
    • File Inclusion
    • Business logic vulnerabilities
    • Capture The Flag (CTF)

Course Level



2 Days

Tuition Fee

18,500.00 THB


อ.วรัญญู สรรพจิต

Our website uses both essential and non-essential cookies to analyze use of our products and services. This agreement applies to non-essential cookies only. By accepting, you are agreeing to third parties receiving information about your usage and activities. If you choose to decline this agreement, we will continue to use essential cookies for the operation of the website. View Policy