Bonsai Information Security - Education

Web Application
Security Training

Bonsai’s Web Application Security Training course focuses on manual and automated, discovery and exploitation of web application vulnerabilities. During this two day course you are going to attend a series of lectures followed by hands on practice. In each practice you will find vulnerabilities to exploit, each with a different level of complexity, which will defy your understanding of the subject.

Our teaching experience helped us create the best Web Application Security Training, which is source code oriented: for each subject, a vulnerable source code snippet is introduced, and programming language agnostic: during the class, attendees will learn about vulnerabilities in Java, PHP, ASP.NET, ASP, Ruby and Python.

The training course was developed so that participants with varying knowledge levels can benefit from it as much as possible. During the first hour, basic HTTP concepts and generic techniques for vulnerability discovery are reviewed, gradually increasing the difficulty level until the most complex attacks are dealt with. Both Web application developers and computer information security experts will benefit from this training course.

The training is oriented towards network administrators, consultants, information security officers, Web Application developers and QA testers.


The training deliverables include:

  1. Booklet with training course slides
  2. Live CD with the Web Application Security tools used during the training
  3. VMware image with the training environment

Next trainings

Bonsai’s trainings are usually delivered in-company, but after receiving numerous requests we started organizing open trainings where employees from different organizations could attend. This is the list of the next events to be held in Buenos Aires, Argentina:

  1. Web Application Security Training - July

Train your developers with us, and we’ll give you back your weekends!

Get a Quotation for the best Web Application Security Training.