Pentesting Web and API Application Foundation Training

The Netherlands

Software Testing

Hackers exploit vulnerable software. Learn to thwart their attacks by adopting their mindset. This knowledge-packed two-day training equips you with both defensive skills as a web developer and offensive skills as a tester. Master the art of probing for risks, get proactive, and protect your software by learning to probe for threats that exploit discrete vulnerabilities.

Any questions? 

Michiel will gladly help you further with any personal or in-company needs you might have.

Get in touch

What will you learn?

This comprehensive course is designed to provide you with in-depth knowledge of ways to safeguard your software. You’ll discover how hacking unfolds in cyberspace – gaining insights into hackers’ strategies and recognizing a wide range of risks. The course also delves into mitigation strategies, provides hands-on experience by exploring hacker tools and tactics, and ultimately improves your software delivery.  

Key takeaways

  1. Think like a hacker to protect your creations.  
  2. Understand diverse hacking techniques and security countermeasures.  
  3. Mitigate risks, including OWASP top 10 vulnerabilities.   
  4. Gain hands-on experience with various tools like SQL injection, cross-site scripting, clickjacking, and more   
  5. Improve application security and software delivery.  

Program

  • Hacking Fundamentals: Techniques and mindset hackers rely on to hack systems in cyberspace  
  • Risk recognition: How to recognize a broad spectrum of specific risks, like OWASP top 10, and explore countermeasures  
  • Exploiting Vulnerabilities: Real-world Simulations with tools hackers use (including SQL injection, cross-site scripting, cross-site request forgery, clickjacking, session hijacking, account enumeration, transport layer security, brute force attacks, password cracking, and parameter tampering)  
  • Hands-on experience: basics of API Security and mobile Services Integration, Automated Attacks, & Dynamic Analysis  
  • Mitigating Risks: Building Secure Software  

Who is it for?

This training is ideal for web developers, software testers, and anyone proactive about software security. Whether you want to fortify your coding skills, improve your software, or shield your systems from external threats, this course is tailored to you.  

Requirements

Basic knowledge of software development is beneficial.

To participate fully, ensure your laptop has at least 4GB of RAM and administration/installation rights.  

Why should I follow this training?

Think like a hacker to safeguard your creations

Gain insights into diverse system vulnerabilities and hacking techniques

Equip yourself with practical skills against real-world risks

Implement proactive security measures and elevate your software delivery game

What else
should I know?

Course information

The program comprises hands-on training with industry-standard tools, engaging real-world simulations, and practical insights from experienced professionals to prepare you for real-world software security challenges.  

Limited seats available – secure yours today.

Training is offered in English.

Remember to bring your laptop.

Delicious lunches are provided.

Also interesting for you

View all training courses
Architecting with Google Compute Engine 

Ready to master Google Cloud in just 3 days? This training equips you to design, develop, and manage robust Google Cloud infrastructure, setting you up for certification success.

Google Cloud Platform (GCP)
3 days
In Person

Next:

17 Dec, 2025

From:

€2095

View training
Deep Learning and AI in One Day

Enrico Erler

Deep Learning
1 day
In Person

Next:

3 Jun, 2025

From:

€725

View training
Certified OKR Leadership (C-OKRL)

OKRs – a popular goal-setting framework businesses, organizations, and individuals use to achieve better outcomes. With clear and measurable objectives, track your progress and stay focused, aligned, and accountable.  This premium training is ideal for leaders and executives looking to initiate or lead OKR implementation in medium and large organizations. The course bridges the gap between OKR theory and practice, ensuring consistency, uniformity, and professional adoption of OKRs.

Sjoerd Nijland

Agile Leadership
Product Leader
2 days
In Person

Next:

3 – 4 Apr, 2025

From:

€1695

View training
Polars Essentials

Enrico Erler

1 day
In Person

Next:

18 Mar, 2025

From:

€725

View training
Docker in One Day

Learn exactly how Docker containers work — how to build them, how to place your applications in them and how to run them.

David Coba

Data and AI
Docker
1 day
In Person

Next:

22 Sep, 2025

From:

€775

View training

Can’t find the course you’re looking for? There’s more!