Burp Suite Enterprise Edition is now available in our secure Cloud  –  Learn more

New learning paths, from the Web Security Academy

Emma Stocks | 13 September 2023 at 10:36 UTC

When you're starting out in the world of web security, it can be overwhelming trying to work out where to begin. There are dozens of vulnerability classes, and numerous exploit techniques to learn about. That's why we've create learning paths. Put simply, they're designed to be an accessible, easily digestible route through the complex world of web security.

Fancy trying it out? Get started on your first learning path here.

How do I use the learning paths?

The new learning paths on the Web Security Academy provide you with a carefully curated, structured approach to develop your knowledge and enhance your skills. The paths are created to cover a variety of things, and each one has specific learning objectives.

They're broken down into topics, each of which contains modules to help you work through the materials. Some of the modules contain the interactive labs you may already be familiar with, while others will give you examples of the vulnerability class or exploit technique you're learning about. You can track your progress through the modules, stop and start to suit your own study schedule, and pick up exactly where you left off when you're next ready to learn.

By presenting the information in this way we're hoping you will be able to take your learning journeys at your own pace, whilst still gaining a deep understanding of the subject matter of your choosing.

Have your say

For this initial launch we've created two learning paths, with plans to add more in the coming months. The first path we've created is an apprentice-level overview of server-side vulnerabilities, giving you an overview of the kinds of vulnerabilities that exist, as well as how an attacker might identify and exploit them in real-world systems. The second path focuses exclusively on SQL injection, giving you the essentials of finding and exploiting this classic vulnerability.

We'd love to hear about your experiences of working through the paths we've created so far, what topics you'd like to see covered next, and how you think we should develop this new feature in the future.

Follow us on Twitter (X) at @WebSecAcademy and post your thoughts - we'd love to hear from you.