Web Application Penetration Testing

Curious about this course?

Enroll now and get access to all of our material and labs!

Plans and Pricing


View enrollment pricing for individual students.


Purchase eLearnSecurity courses for your company.

Study at your own pace

The Web Application Penetration Testing course (WAPT) is an online, self-paced training course that provides all the advanced skills necessary to carry out a thorough and professional penetration test against modern web applications.

Discover Contents

Extremely Hands-on

Thanks to the extensive use of Hera Lab and the coverage of the latest research in the web application security field, the WAPT course is not only the most practical training course on the subject but also the most up to date. Practice Web App Pentesting against a number of real world web applications!

Discover Labs

Become Certified

Obtain the eWPTv1 certification and prove your practical skills with the only 100% practical certification on Web Application Penetration Testing

Discover eWPTv1

Course at a glance

  • Start from the very basics, all the way to advanced post-exploitation activities
  • Wide coverage of OWASP’s TOP 10
  • Master Burp Suite
  • In-depth Web application analysis, information gathering and enumeration
  • XSS & SQL Injection
  • Session related vulnerabilities
  • HTML5 attacks
  • Pentesting Content Management Systems (CMS)
  • Pentesting NoSQL databases and NoSQL-related APIs / NoSQL injections
  • Start from Web Application Attacks and land to Network and Infrastructure Penetration Testing
  • Gives you access to dedicated forums
  • Makes you a proficient professional web application pentester
  • After obtaining the eWPTv1 certification qualifies you for 40 CPE

Course material

  • 78 labs in Hera Lab
  • 2344 slides
  • 5 hours of HQ video training material

Course delivery

  • Self-paced, HTML5, PDF, MP4
  • Off-line access available
  • Access from PC, Tablet and Smartphone

Test drive this course for free

I agree to receive emails from Caendra Inc.


  • Module 1 : Penetration Testing Process

    In this module, the student will learn the methodologies and the reporting best practice in order to become a confident and professional penetration tester.

  • Module 2 : Introduction to Web Applications

    In this module, the student will understand the basics of Web applications. An in-depth coverage of the Same Origin Policy in its latest developments and the Cookie RFC will help experienced and non-experienced penetration testers gain critical foundational skills useful for the rest of the training course.

  • Module 3 : Information Gathering

    Let the Penetration test start! Every penetration test begins with the Information gathering phase.

  • Module 4 : Cross-Site Scripting

    In this module he most widespread web application vulnerability will be dissected and studied in all its parts. Students will gain all the skills needed to fully unleash the power of cross site scripting exploitation!

  • Module 5 : SQL Injection

    In this module will be studied the most advanced techniques to find and exploit SQL Injections.

  • Module 6 : Authentication and Authorization

    During this module, the student will learn the most common authentication mechanisms, their weaknesses and the related attacks.

  • Module 7 : Session Security

    The student will learn how sessions work and what are the most common attacking patterns. Moreover they will study how to prevent session attacks.

  • Module 8 : Flash

    The student will first study the Flash security model and its pitfalls. Then will use the most recent tools to find and exploit vulnerabilities in Flash files.

  • Module 9 : HTML5

    In this module we will be discussing the most important elements of HTML5: cross origin resource sharing, cross window messaging, websockets, sandboxing and web storage. The student will learn how to leverage these features to mount successful attacks.

  • Module 10 : File and Resource Attacks

    The student will learn how to identify and exploit path traversal, file inclusion and unrestricted file upload vulnerabilities.

  • Module 11 : Other Attacks

    The student will practice a number of vulnerabilities that, despite being less known or publicized, are still affecting a number of web applications.

  • Module 12 : Web Services

    During this highly in depth module the student will first become familiar with web services paradigms and protocols and then learn all the most important related security issues.

  • Module 13 : XPath

    In this module, the student will learn advanced XPath injection techniques, in theory and practice in Hera lab.

  • Module 14 : Penetration Testing Content Management Systems

    This module, covers the whole range of penetration testing activities against CMS, from information gathering, enumeration and brute force attacks, to host exploitation through vulnerable plugins and lateral movement through credential reuse. More specifically, the student will get accustomed to identifying vulnerabilities like XSS, SQLi, RCE, SOME and CSRF on WordPress and Joomla CMS, as well as chaining various vulnerabilities for maximum exploitation.

  • Module 15 : Penetration Testing NoSQL Databases

    In this module, the student will learn how to manually identify and exploit vulnerabilities in NoSQL databases or NoSQL-powered web applications, as well as execute elaborate attacks against exposed NoSQL-related APIs.Transitioning from a compromised NoSQL database to full host exploitation, as well as effective data exfiltration methods are also covered in this module.

Download PDF Syllabus


  • Basic understanding of HTML, HTTP and JavaScript.
  • Reading and understanding PHP code will help although it is not mandatory.
  • No web development skills required.

This training course is for...

  • Penetration Testers
  • Web developers
  • IT admins and staff


The WAPT course is a practice-based curriculum. Being integrated with Hera Lab, the most sophisticated virtual lab on IT Security, it offers an unmatched practical learning experience. Hera is the only virtual lab that provides fully isolated per-student access to each of the real world network scenarios available on the platform. Students can access Hera Lab from anywhere through VPN.

Lab IDDescriptionCategory
Lab 1 Introduction - 2 Challenging Labs Educational
Lab 2 Information Gathering - 2 Challenging Labs Educational
Lab 3 Cross Site Scripting - 7 Challenging Labs Educational
Lab 4 SQL Injection - 10 Challenging Labs Educational
Lab 5 Authentication and Authorization - 14 Challenging Labs Educational
Lab 6 Session Security - 9 Challenging Labs Educational
Lab 7 Flash Security - 1 Challenging Lab Educational
Lab 8 HTML5 - 4 Challenging Labs Educational
Lab 9 File and Resources Attacks - 4 Challenging Labs Educational
Lab 10 Other Attacks - 1 Challenging Lab Educational
Lab 11 Web Services - 4 Challenging Labs Educational
Lab 12 XPath - 5 Challenging Labs Educational
Lab 13 Exploiting Wordpress - 5 Challenging Labs Educational
Lab 14 From Static Analysis to WordPress Exploitation - 1 Challenging Lab Educational
Lab 15 Chaining Vulnerabilities To Remotely Extract WP Admin Credentials - 1 Challenging Lab Educational
Lab 16 Redis Exploitation - 3 Challenging Labs Educational
Lab 17 NoSQL Injections Against MongoDB - 4 Challenings Labs Educational
Lab 18 CouchDB Exploitation - 2 Challenging Labs Educational


Get eWPTv1 Certification

eLearnSecurity's eWPTv1 certification is the most practical AND professionally oriented certification you can obtain in web application penetration testing

Learn more


  • Dimitrios Bougioukas
    Dimitrios Bougioukas

    Dimitrios Bougioukas, Training Director of eLearnSecurity, holds a B.Sc. in Computer Science from the Athens University of Economics and Business. For the past 5 years, he has worked as a Business Information Security Engineer and Information Security Analyst for a major financial institution, as a Penetration Tester within EY's practice and as a Senior IT Security Researcher and Trainer within eLearnSecurity. Dimitrios specializes in advanced cyber threat simulation, threat intelligence and purple team tactics. He has been engaged on numerous penetration testing activities against critical infrastructure, web applications and mobile applications. In terms of research, Dimitrios has presented at information security conferences such as BSides and has received acknowledgements from security, telecom and other major companies for finding and reporting vulnerabilities in their web applications, in a responsible manner (IBM Trusteer, LG etc.). In the context of his professional career, his work led to international and regional information security awards in prestigious and highly competitive contests such as Retail Banker International Awards.

  • Fabrizio Siciliano
    Fabrizio Siciliano

    With nearly 20 years of experience in the Information Security industry in both Offensive and Defensive roles within the private and public sectors, and with the last seven years primarily focused on the offensive side of the house, Fabrizio brings his real-world experience to the eLearnSecurity body-of-knowledge to provide the latest in information security research and techniques.

Previous Authors

Previous Authors include Armando Romeo, Francesco Stillavato, Davide Girardi

Enroll now and get access to all of our material and labs!


The mix of Video Tutorials, exercises and support from fellow students on the forum was fantastic. Anyone who wants to specialize in Web Penetration Testing, this course is a must to get you started. Thanks for your efforts in making this happen

Denis Hancock
Manager Consulting Pty Ltd

Having been in the security field for over 5 years I assumed this would be a quick and easy certification. After getting into the training course I was pleased to find that I was learning new things and that the course was certainly more challenging than I had anticipated. I found that it filled in several knowledge gaps when it comes to pentesting, and I would recommend this course to both veterans and newcomers to the security field.

Steven Collins

eLearnSecurity's training really dives deep into the underlying concepts beneath pentesting tools.

Timothy E. Everson
Novell inc

Go to top of page