WEB-200: Foundational Web Application Assessments with Kali Linux

WEB-200: Foundational Web Application Assessments with Kali Linux

OffSec’s Foundational Web Application Assessments with Kali Linux (WEB-200) course introduces web application security testing methodology, tools, and techniques in a hands-on, self-paced environment. Learners gain a deep understanding of common web vulnerabilities and how to exploit them responsibly.

Individuals completing the online training course and passing its exhaustive exam earn the OffSec Web Assessor (OSWA) certification. This credential demonstrates your ability to identify and exploit vulnerabilities in web applications. The OSWA stands out in the web security field, reflecting a commitment to the hands-on skills employers seek.

OSWA Certification Badge

Starting at $1,749

Foundational Web Application Assessments with Kali Linux Syllabus

  • Tools for the Web Assessor

    Gain hands-on experience with industry-standard tools like Burp Suite, OWASP ZAP, and sqlmap, used by web application penetration testers to identify security vulnerabilities, exploit weaknesses, and assess the security posture of web applications.

  • Cross-Site Scripting (XSS) Introduction, Discovery, Exploitation and Case Study

    Learn how attackers inject malicious code into web pages to hijack user sessions, steal sensitive data, or deface websites. Discover how to identify and exploit XSS vulnerabilities, and understand the different types of XSS attacks. Explore real-world case studies to learn from past incidents and strengthen your defenses.

  • Cross-Site Request Forgery (CSRF)

    Uncover how attackers trick authenticated users into performing unintended actions on web applications. Learn how to identify and exploit CSRF vulnerabilities, and explore practical mitigation techniques to protect against these attacks. Understand the impact of CSRF on user trust and data integrity.

  • Exploiting CORS Misconfigurations

    Dive into the security risks associated with Cross-Origin Resource Sharing (CORS) misconfigurations. Learn how attackers exploit these vulnerabilities to bypass access controls and access sensitive data. Understand how to identify and fix CORS misconfigurations to ensure secure cross-origin communication.

  • Database Enumeration

    Master techniques to gather sensitive information about a web application’s database structure and content. Learn how attackers leverage this information to craft targeted attacks. Explore various database enumeration methods and learn to implement countermeasures to protect against them.

  • SQL Injection (SQLi)

    Learn how to exploit vulnerabilities in web applications that interact with databases, potentially leading to data compromise, unauthorized access, or website defacement. Understand the different types of SQL Injection attacks and the impact they can have on an organization’s security posture. Explore techniques for preventing and mitigating SQL Injection vulnerabilities.

  • Directory Traversal

    Understand how attackers navigate outside the intended web server directories to access sensitive files, configuration information, or source code. Learn to identify and exploit directory traversal vulnerabilities, and understand how to prevent unauthorized access to restricted areas of a web server.

  • XML External Entity (XXE) Processing

    Explore how attackers manipulate XML processors to access files, execute commands, or perform denial-of-service attacks. Understand the mechanics of XXE attacks and the potential consequences. Learn to secure XML parsers and prevent XXE vulnerabilities in web applications.

  • Server-Side Template Injection (SSTI)

    Understand how attackers inject code into web application templates, potentially leading to remote code execution, information disclosure, or privilege escalation. Learn how to identify and exploit SSTI vulnerabilities and explore mitigation techniques to protect your web applications.

  • Server-Side Request Forgery (SSRF)

    Learn how attackers force a web application to make requests to internal or external systems, potentially leading to data exfiltration, service disruption, or access to internal resources. Understand the various SSRF attack vectors and implement countermeasures to prevent unauthorized requests.

Start learning with OffSec

Most
popular

Course + Cert
Exam Bundle

$1,749/once

The bundle includes 90 days of access to a single course, the associated labs and a single exam attempt.

Buy now
Best
value

Learn
One

$2,749/year*

One year of lab access alongside a single course plus two exam attempts.

Buy now
All
access

Learn
Unlimited

$6,099/year*

Unlimited OffSec Learning Library access plus unlimited exam attempts for one year.

Contact us
Large
teams

Learn
Enterprise

Get a quote

Flexible terms and volume discounts available.

Book a meeting
*Subscription auto-renews unless canceled.

What our community is saying

Community Discord Member

Community Discord Member

...the way it's all presented, and the fact that there are VMs you can start that let us break the problem into smaller problems... makes for a very pleasant learning experience.

Andy Olchawa

Andy Olchawa

Offensive Security Professional

The challenges were far from easy, and it was evident that their intention was to evaluate not only technical skills but also the ability to think outside the box. Also, awesome experience, lots of fun!

Read more

WEB-200 FAQ

Upcoming WEB-200 Live Training

Jun 10 - Jun 13, 2025

Location: Frankfurt

Languages: German

Hosted by:

Exploit Labs
Register now
See all live training events

OffSec Web Application Assessment Courses & Certifications