Are you looking for training in how to use Burp? Would you like to take
your understanding of Burp Suite to the next level?
Why not consider one of the courses offered by our
partners? These courses provide
hands-on training on how to use Burp Suite to find real-world
vulnerabilities. Dates of
public training courses
below. Alternatively, you can contact
any of our training partners directly to discuss options for
tailored on-site training.
If training courses aren’t for you, why not consider a
Burp Suite Training Partners
Burp Suite training is available for both novice and advanced
Burp Suite users through our specialist training partners across the
This three-day training allows users to get the most out of Burp, optimizing time spent. Work will be faster, more effective and more efficient. Attendees will also learn to measure the quality of their attacks, a crucial skill in real-life engagements. Finally, alternative strategies and techniques will be demonstrated, giving a wider view of available functionalities.
The training is based on 40+ micro-challenges replicating real-life scenarios: complex brute-force, data extraction, custom formats, thin clients, ACL, cryptography, anti-CSRF tokens, aggressive disconnection, ... and more!
The following roles are expected: Web application penetration testers, QA people and advanced developers. Whatever your role, this training will provide beneficial automation skills whether novice or expert:
Novice: A 30-minute pre-sesssion warm-up will set you up for the core training.
Expert: Been using Burp Suite for years? Never fear! Numerous optional challenges will develop your fu.
Half day, full day and two day workshops are available
This training provides you with both a theoretical and practical understanding of how to use the very popular hacking tool Burp Suite Professional. Mastering this professional ethical hacker tool of choice will give you a capability to easily find vulnerabilities in your web applications.
Burp Suite has possibly been the most consistently high quality tool for assessing web applications for over a decade and the methodologies in this course are a must for any serious web application assessment.
Suitable for new entrants in web application security, also intermediate and advanced web application security specialists.
Developing Burp Suite Extensions - From manual testing to security automation
In this hands-on class, attendees will learn how to design and develop Burp Suite extensions for a variety of tasks. After a quick intro to Burp and its extension APIs, we work on setting up an optimal development environment enabling fast coding and debugging. Then, we discuss and create many different types of plugins, including:
* A custom logger to provide persistency and data export functionalities using MongoDB
* A simple (and yet useful) replay tool
* Passive check for Burp's scanning engine to detect missing SubResource Integrity (SRI) attributes
* Active check for Burp's scanning engine to detect Expression Language (EL) injection vulnerabilities
* A custom Intruder payload generator to fuzz using Radamsa
Finally, we leverage our extensions to build a security automation toolchain integrated in a CI environment (Jenkins).
This workshop is based on real-life use cases where the extension capabilities of the tool can be unleashed to improve efficiency and effectiveness of security auditing. While we develop our code in Java using Oracle's NetBeans, we also provide templates for IntelliJ IDEA and Eclipse. Additionally, we discuss and provide code for both Python and Ruby so that you can work using your favorite programming language.
The training is suitable for both web application security specialists and developers. Attendees are expected to have rudimental understanding of Burp Suite as well as basic Object-Oriented Programming experience. While Burp extensions are developed live in Java, attendees can work on Python or Ruby since all exercises are also provided in those languages.
This workshop, through hands-on demos and labs, will introduce the student to the techniques needed to remotely detect and validate the presence of common vulnerabilities in web-based applications using Burp Suite, the industries' most popular toolkit.
Testing will be conducted from the perspective of the end user (as opposed to a source code audit). Security testing helps to fulfill industry best practices and validate implementation. Remote security testing is especially useful since it can be done at various phases within the application's lifecycle (e.g. during development), or when source code is not available for review.
People who are auditing web application security, developing web applications, or managing the development of web applications.
The Web Application Hacker's Handbook (CREST approved course)
This 2 or 3 day course is a practical counterpart to the well-known Web Application Hacker's Handbook, and is developed and taught by the authors, with strong focus on practical attacks and methods. After a short introduction to the subject the course then delves into common insecurities. The Web Application Hacker's Handbook course is CREST approved and is useful preparation for: CREST Certified Infrastructure Tester (CCT INF) and CREST Certified Web Applications Tester (CCT APP).
Those who wish to build on their skills in web application security, including those wishing to learn how to get the most out of Burp. Also suitable for new entrants to the web application security industry, including those working in Quality Assurance or internal testing functions.
This course has frequently been recommended by candidates who have taken both the CREST CCT Infrastructure and CCT Web Applications exams.
Tactical Burp Suite & Advanced Tactical Burp Suite
Tactical Burp Suite:Tips and Tricks to Using Our Favorite Web PenTesting Tool!
Kevin Johnson and Jason Gillam will explore the various features of Burp Suite, focused on how we use the system during our penetration testing.
This webinar will use hands-on examples to reinforce the topics and tricks that Jason and Kevin will be showing. Not only will we be doing the demos, but a target system will be made available to attendees so that they can do the examples along with Kevin and Jason.
This webinar costs $25 dollars and runs for approximately two hours.
This three-day hands-on training, gives participants a practical knowledge of web application security issues. Throughout the course the participants will analyse the security of a number of systems for vulnerabilities using Burp Suite Professional. Each vulnerability is preceded by a theoretical introduction, and for these vulnerabilities a method of protection against attacks.
The training can be delivered in English onsite for a closed group.
Those who wish to build on their skills in web application security. Recommended (but not required) experience:
1. Basic knowledge of SQL
3. Basic knowledge of HTTP communication
4. General IT background
We love owning the application layer and this course reflects that. We want to take students on a path of obtaining offensive security knowledge in the web application realm. The course focuses on the fundamentals rather than specific tools and introduces you to our hacking methodology refined over thousands of assessment conducted over the last 14 years. SQLi/XML/XPath/LDAP/RFI/DOM, this industry loves acronyms. From the start we cut through the acronym soup and start serving up plain and simple approaches to understand how applications are built and where vulnerabilities are introduced. This is hands on learning, not just listening.
This course is meant for those who are new to penetration testing, network administrators or indeed anyone who wants to understand more about offensive testing and get their hands dirty breaking into various networks and applications.
Practical Web Application Penetration Testing (PWAPT)
This hands-on course provides customized training on the latest web application security tools and manual techniques for performing end-to-end web application penetration testing engagements. After a quick overview of the penetration testing methodology, the instructor will lead students through the process of testing and exploiting a target web application using the techniques and approaches developed from a career of real world application penetration testing experiences. Students will be introduced to the best tools currently available for the specific steps of the methodology including Burp Suite Pro, and taught how these tools integrate with manual testing techniques to maximize effectiveness. A major goal of this course is teaching students the glue that brings the tools and techniques together to successfully perform a web application penetration test from beginning to end.
Application Security professionals with a general understanding of the OWASP Top 10.
Do you want to train in your own time? Are you looking for
resources to complement your training?
The best place to start is
The Web Application Hacker’s Handbook, authored by Burp
Suite creator Dafydd Stuttard. This book, now its second
edition, remains the go-to text for all security testers. The
book covers all areas of web application security testing and
each chapter provides explanations of how to use Burp Suite to
Buy on Amazon:
Online labs are available to complement your learning. The
second edition of the Web Application Hacker’s Handbook
references links to online labs throughout, allowing you to
understand the background and theory behind each vulnerability,
and then try it for yourself online.
Burp Suite Essentials,
authored by Akash Mahajan. This book is written for those
interested in learning how to test web application and the web
part of mobile applications using Burp. It is specifically
designed to meet the needs of those who have a basic experience
in using Burp and are now aiming to become a professional Burp
Buy on Amazon: