Hack2Secure WASD Candidate Reference Guide
Hack2Secure WASD Candidate Reference Guide
www.hack2secure.com | certificate@hack2secure.com
Hack2Secure WASD Certification: Candidate Reference Guide 1
Table of Content
www.hack2secure.com | certificate@hack2secure.com
Hack2Secure WASD Certification: Candidate Reference Guide 2
Globally Available | Proctored | 180 mins | 90 MCQ | Passing Grade: 60% | Exam Language: English
Web Application Security Defender (WASD) Certificate program evaluates individual's implementation level
skills required for Web Application Security Assessment. This program ensures candidate's awareness on
Application Security Challenges, Risk, Tools, Techniques and methodologies along with hands-on practical level
knowledge and skill-sets.
WASD is based on Application Security Industry Standards and Best Practices and ensures Knowledge and
Understanding of Secure Web Application Assessment requirements. It walks through different
phases/domains of Application Security Testing and provide required practical strategies and methodologies
to evaluate Security at every level.
Student Student
EXAM OBJECTIVES
Module#1: Introduction to Web Module#4: Session Management
Application Security The Candidate needs to demonstrate an
The candidate needs to demonstrate an understanding knowledge about Web Session,
understanding knowledge on Web Application related Attributes, Security Flaws and Best Practices
Security and Testing methodologies along with How HTTP maintains the State and related
understanding of Assessment Tools. Understanding Security concerns
and Best Practices for HTTP and HTTPS protocol. Security best Practices for Session Management
About World Wide Web (WWW) Exploiting Session Information
Web Application Security Testing Web Cookie Security Flags and Attributes
o Introduction, Approach and Scope
HTTP Protocol Module#5: Injection Attacks
o Request and Response Analysis The Candidate needs to demonstrate an
o Related Security Concerns understanding knowledge about Command
HTTPS Protocol Injection, Local & Remote File Inclusion
o About SSL/TLS wrapper over HTTP Vulnerabilities. SQL Injection Attack and Testing
o Testing Methods and Best Practices methods
Web Proxies & Web Vulnerability Scanners
Command Injection
o About, Testing Methods
Module#2: Gathering Information
Local & Remote File Inclusion Vulnerabilities
The Candidate needs to demonstrate an SQL Injection
understanding knowledge about Reconnaissance o About, Types & Attack Scope
(Web) using both Active and Passive methods. o Testing Methods
Exploring Google and Public Sources for Information
Leakage. Scanning and Fingerprinting Server for Module#6: Cross Site Scripting
Services, Configurations and Implementation flaws.
The Candidate needs to demonstrate an
Open Source Intelligence understanding knowledge about Cross Site Scripting
Google for Security Assessment (XSS) attacks and testing methods. AJAX and JSON
Spidering Files & Directories Security Concerns
Fingerprinting Services & Configurations Cross Site Scripting (XSS)
Exploring Hidden Locations o About, Types & Attack Scope
o Testing Methods
Module#3: Authentication, Authorization HTML Injection
& Accountability Security concerns related with AJAX & JSON
The Candidate needs to demonstrate an
understanding knowledge about Authentication, Module#7: Web Application Filters &
Authorization and Accountability, related Security Firewall
concerns and best practices. The Candidate needs to demonstrate an
Authentication understanding knowledge about Web Application
o Mechanism, Types & Schemes Filters & Firewalls, their testing and bypassing
Username harvesting, Cracking Weak Passwords techniques.
Authorization Web Application Filters
o Process and related Security Concerns o About, Types & Attack Methods
Accountability and potential Information Web Application Firewall
Leakage Points o About, types & Attack Methods
HOW TO PREPARE
Once you have decided to get WASD Certification, you can start the preparation for the same. There
are various options for the candidates to prepare for their WASD Exam
Hack2Secures Workshop on Web Application Security Testing provides hands-on exposure using both
Real-Time scenarios and Simulated Lab environment to required Tools and Techniques on different Web
Security Risk and Attack vectors.
Scoped around OWASP Web Application Security Testing Guide, these intensive practical sessions provides
deep-dive on required practical tips and tricks to evaluate, test and assess Security of Web Application.
Key-Take Away
General
How soon after the proctored exam will I receive the Hack2secure certificate?
After Successful completion of a Hack2secure Certification exam, the soft copy of the Certificate will be
delivered to you on the email address provided within 7-10 business days.
Unfortunately, we can't provide a question-by-question breakdown of what you got right and what you got
wrong. If we did so, it would reveal too much information about the exam and possibly compromise the exam's
integrity for future students.
If you had issues with specific questions, you can note that in your exam evaluation form or send an email to
certificate@hack2secure.com, and our team will get back to you within 5 business days. We do review the
exams regularly for quality and review any questions that a student flags as potentially problematic.
About Hack2Secure
Hack2Secure
Inspire, Induce, Innovate
The IT Industry has evolved from a standalone desktop and independent applications to a Complex Cloud
environment. Today technology have become so advanced to reduce costs in terms of hardware, software,
development and maintenance, however this has created an increased risk to SECURITY.
Hack2Secure excels in Information Security Domain and offers customised IT Security programs, including
Training, Services and Solutions. Our programs are designed by industry experts and tailored as per specific
needs. We strive to serve with quality, efficiency, and timely delivery through our team of experienced and
certified professionals in Information Security. We help students, professionals and companies with
knowledge, tools and guidance required to be at forefront of a vital and rapidly changing IT industry.
Security Training
Vendor Independent, Customizable, Across Domains, Multiple Levels
Hack2Secure excels in delivering intensive, immersion security training sessions designed to master
practical steps necessary for defending systems against the dangerous security threats. Our wide range of
fully customizable training courses allow individual to master different aspects of Information Security as
per their industry requirement and convenience.
Security Certification
Globally delivered and Proctored Security Certification programs with PearsonVUE
Vendor Independent Programs based on Industry Security Standards and Practices
certificate@hack2secure.com @hack2secure
Hack2Secure, #681, First Floor, 15th Cross, 8th Main, 2nd Phase,
J.P. Nagar, Bangalore, Karnataka, 560078