New learning paths, from the Web Security Academy

By admin
New learning paths, from

the Web Security Academy
ORG

Emma Stocks | 13

September 2023
DATE

at

10:36 UTC
TIME

When you’re starting out in the world of web security, it can be overwhelming trying to work out where to begin. There are

dozens
CARDINAL

of vulnerability classes, and numerous exploit techniques to learn about. That’s why we’ve create learning paths. Put simply, they’re designed to be an accessible, easily digestible route through the complex world of web security.

Fancy trying it out? Get started on your

first
ORDINAL

learning path here.

How do I use the learning paths?

The new learning paths on

the Web Security Academy
ORG

provide you with a carefully curated, structured approach to develop your knowledge and enhance your skills. The paths are created to cover a variety of things, and each one has specific learning objectives.

They’re broken down into topics, each of which contains modules to help you work through the materials. Some of the modules contain the interactive labs you may already be familiar with, while others will give you examples of the vulnerability class or exploit technique you’re learning about. You can track your progress through the modules, stop and start to suit your own study schedule, and pick up exactly where you left off when you’re next ready to learn.

By presenting the information in this way we’re hoping you will be able to take your learning journeys at your own pace, whilst still gaining a deep understanding of the subject matter of your choosing.

Have your say

For this initial launch we’ve created

two
CARDINAL

learning paths, with plans to add more in

the coming months
DATE

. The

first
ORDINAL

path we’ve created is an apprentice-level overview of server-side vulnerabilities, giving you an overview of the kinds of vulnerabilities that exist, as well as how an attacker might identify and exploit them in real-world systems. The

second
ORDINAL

path focuses exclusively on

SQL
ORG

injection, giving you the essentials of finding and exploiting this classic vulnerability.

We’d love to hear about your experiences of working through the paths we’ve created so far, what topics you’d like to see covered next, and how you think we should develop this new feature in the future.

Follow us on Twitter (X) at @WebSecAcademy and post your thoughts – we’d love to hear from you.