1. Home
  2. /
  3. Courses
  4. /
  5. Offensive Security
  6. /
  7. Web Penetration Testing

Web Penetration Testing

$ 3.000

In this course, we will look at all the vulnerabilities associated with web applications and proprietary web services. These vulnerabilities will be tested in black box and white box. In Black Box mode, special Web Fuzzing and Web Crawling techniques can be used. The process of preparing laboratory environments to detect vulnerabilities will also be in the form of a White Box, which can lead to the emergence of critical level vulnerabilities and the chain of Remote Code Execution attacks.

View full Syllabus

This course is not currently active

Category: Offensive Security
  1. The student undertakes to have all the requirements listed on the course description page and is fully aware of the prerequisites of the course and also accepts them. The student has read all the topics of the course and has registered with full knowledge of them, and after registering, he will not have any right to object to the topics and other sources of information used in the course.
  2. All the trainings provided in this course have been prepared and compiled only for scientific and educational purposes, so the student undertakes not to use this course in order to commit criminal acts in cyberspace, and Oxin Imen Nikrad Company does not take any responsibility for the misuse of this course. The student also undertakes not to publish the course resources and educational materials.
  3. This course is prepared in accordance with international standards, and at the end of the course, a certificate will be awarded to the student only based on the approval passing this course. The minimum passing score for course challenges is 70. It is also the time given to solve practical challenges until the end of the course.
  4. The audience of this course is cyber security experts and computer students with a focus on secure computing and, of course, those interested in the field of cyber security. Therefore, the course has been developed according to international standards with the aim of scientific advancement of the audience. It is hoped that it can be effective in the scientific progress of the country.
  5. The content of the course is completely indigenous and is developed according to international standards. so in case of any copying, Oxin Imen Nikrad Company reserves the right to sue and prosecute the violator.
  6. Access to the LMS or Learning Management System is only possible via Safe Exam Browser browser, but access to the lab can be with any browser, this browser is only installed on Windows, Mac and iOS operating systems, and other operating systems are not supported.
  7. The minimum age of a student to participate in the course is 18 years. For this purpose, in case of authentication, this issue will be considered at the time of registration.
  8. The course fee can be received both in one place and in installments, and student registration is possible after studying and accepting the course conditions. after the start of the course If the student cancels it for any reason, no amount will be refunded.
  9. The content of the course will be in the form of online recorded videos and will be available to the students on the unk9vvn.com website and can not be downloaded. Also, a Cheat Sheet in the LMS environment and a dedicated laboratory will be available to the student for always.
  10. Any cyber attack and attempt to disrupt the services by the user will be prosecuted and if a vulnerability is discovered from the systems of the unk9vvn.com website, you can share it with us from the contact us section in website and if the vulnerability is confirmed, receive the appropriate reward.

Dedicated Laboratory

Awarding a Valid Certificate

100 Hours of Training

Course Highlights

  • This course is compiled and designed at the highest technical level that is valid in the world and is studied in master’s degrees, so all the topics of the course will be fully and comprehensively evaluated on a dedicated laboratory, and it has been tried that all case scenarios be close to the real global vulnerabilities in order to strengthen the student methodology, which can be very important in the field of vulnerability discovery.
  • The purpose of designing these courses is to produce efficient human resources that can provide good technical power for products and defense security solutions for economic purposes, therefore standardization and completeness of the course has been one of our design sensitivities in compiling the course.

Operational Power

  • In this course, you will learn all the web-based vulnerabilities that have been proposed and documented in the world. This learning is not just an academic introduction to vulnerabilities and techniques, but you will understand all the dimensions of a vulnerability and the latest published techniques in conferences and CTF competitions, and self practice them through a dedicated lab.
  • This creates a real operational power in the student to be strengthened along with the theoretical aspects of operational dimensions and to progress in detecting vulnerabilities both in the form of Black Box and White Box and Grey Box.
  • Among these capabilities, we can mention the reverse engineering power of dynamic libraries and Microsoft services, which is provided to you in the form of decompiled text of the web application, and you have to identify unauthorized and verified user control points and try to trace the input values that passed to Parser functions and if there is an uncontrolled or weak process, exploit it and design a code for this exploitation.

Process Holding Course

  • The relevant course will be added to your user panel as soon as you purchase, and will show you the progress of the course. If you click on it, you will enter the dedicated LMS environment of that course, All the topics in Syllabus are organized in there.
  • The new user must study from the first stage of the course, because the other stages will be locked, so the student will proceed according to the correct process from the beginning, in each stage there is an instructional video that is available for viewing online. It will not be possible to download it in any way.
  • In addition to the instructional video, there are written materials as a Cheat Sheet that will help the student to easily perform the correct process of implementing the subject studied in the laboratory, at each stage of training vulnerabilities, an address based on the issue will be placed in the challenge laboratory so that the student is directed to the laboratory after learning and solves the relevant challenge.
  • All course content is available to students only through unk9vvn.com and will be available forever. The student must pass all the course topics, otherwise the certificate will not be issued, and the course will be incomplete, in which case the access time to the course must be extended for a small fee and the student must complete the course.

Course Details

Related Courses


Invite & Earn

Signup to start sharing your link

Available Coupon