10-weeks crash course on ETHICAL WEB HACKING for total beginners

[Update 30 Apr 2020 9.00am]
All slots have been taken. Please check back again to see if any new slots have opened up.
Have you always wanted to learn web hacking?
Now you can! Simply sign up for our crash course on hacking for TOTAL BEGINNERS!

This entirely FREE course entitles you to:

  • *10 live training sessions conducted in a virtual classroom by renowned trainers who taught at Black Hat conferences
  • *6 months of virtual lab access to practice what was taught
  • *Capture The Flag (CTF) challenge to test your skills at the end
Upon completion of the course you will be presented with a digital certificate and a badge issued by NUS.
Course Dates:
Live training sessions will be conducted every Friday for 10 weeks starting from 8 May from 11.30am to 1.30pm
Prerequisites:
All aspiring and passionate NUS staff and students with little or no knowledge of web hacking are welcomed to participate. However, you should have some understanding of basic concepts in programming, database, and web applications.
Participants will be required to attend all training sessions, complete all the virtual labs, participate in the CTF challenge and the upcoming NUS Bug Bounty Challenge 2020.

No Class Details
1 Web Fundamentals
  • Client Side Script
  • Server Side Script
  • Web Server
  • HTTP protocol
  • Database
2 Web Applications Deployment
  • Web Design Pattern
  • Web Application Framework
  • Web Application Architecture
3 Web Applications Reconnaissance
  • Identify Web Server and Operating System
  • Identify Web Application Language and Framework
  • Identify Database
4 Web Applications Vulnerability Part 1
  • Command Injection
  • Code Injection
  • SQL Injection
5 Web Applications Vulnerability Part 2
  • Broken Authentication
  • Sensitive Data Exposure
  • XML External Entity
6 Web Applications Vulnerability Part 3
  • Broken Access
  • Cross Site Scripting
  • Security Misconfiguration
7 Web Applications Vulnerability Part 4
  • Insecure Deserialization
  • Insufficient Logging and Monitoring
8 Web Applications Exploitation
  • Security Misconfiguration
  • Vulnerable Service
9 Web Applications Exploitation Case Study
  • CVE 1
  • CVE 2
  • CVE 3
10  Capture The Flag
  • Apply what you learn!
  • Walkthrough the challenge!