Web Hacking

 

This course is designed for those who wish to have a deeper understanding about how to take advantage of SQL Injection, XSS Scripting, Remote and Local File Inclusion vulnerabilities and more related to attacks occuring in web application. The methodology we use is the OWASP TOP 10 (Top 10 Attacks) in the real world.