Course archive

The courses below were all published in 2015 or earlier. While we stand by pubishing them then, we’ve grown so much since. We recognize that these workshops don’t exactly meet our standards, as we understand them today. 

All classes are available within our premium membership, and have adjusted CPE awards to reflect their respective contents. If you join, please keep in mind that some of the information inside might be outdated or not relevant. We’ll be adding notes at the beginning of each course to let you know what’s worth checking out in each! 

The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription

Course format

    • The course is self-paced – you can visit the training whenever you want and your content will be there.
    • Once you’re in, you keep access forever, even when you finish the course. 
    • There are no deadlines, except for the ones you set for yourself. 
    • You time will be filled with reading and videos

Certificate of completion, no CPE credits


 Module 1 

SQL Injection + OS Command Injection

Module 2 

Cross Site Scription ( XSS ) 

Module 3 

Broken Authentication and Session Management

Module 4

Insecure Direct Object Reference 

Module 5

Security Misconfiguration 

Module 6 

Sensitive Data Exposure

Module 7

Missing Function Level Access Control

Module 8

Cross Site Request Forgery 

Module 9

Using Components with Well-known Vulnerabilities

Module 10

Open Redirects and Forwards 


If you have any questions, please contact our eLearning Manager at [email protected].

Course Reviews


6 ratings
  • 5 stars2
  • 4 stars4
  • 3 stars0
  • 2 stars0
  • 1 stars0
  1. anushka chhoker


    very informative course

  2. Good


    Good reading for beginners

  3. Good course


    Thank you for this course. It’s from the very basics.

  4. Good course


    Thanks for this course. It will be explained for begginer the different name of attaque.

  5. Excelent course


    Thank you for this course. It’s from the very basics.

  6. Exploiting the OWASP TOP 10 Vulnerabilities (W14)


    Nice course.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.