Bug bounty, Logs Analysis and Threat intelligence
Security Auditing and Evaluation Lab, NUST
Mode of Training:
Professionals and Students
In the digital age, web application penetration testing is one of the most critical elements of an organization’s vulnerability management program. In this training, we will explain the role of penetration testingin protecting your organization against web-related exploitations. We will cover the OWASP TOP 10 vulnerabilities in detail. Cross-Site Scripting and SQL Injection vulnerabilities have been sensationally exploited in malicious attacks. We will focus on a hands-on training on these vulnerabilities by providing practical scenarios and exploiting them. Moreover, audience will learn the basics of a Security Information Event Manager (SIEM) and Threat Intelligence, and why these are used in a security operations center (SOC). SIEM software solutions detect threats using real-time reporting and analytics of security logs and events. By the end of this training, attendees will learn to reduce the impact of security breaches using open source solutions.
Technical Content to be Covered: