Agarri's Mastering Burp Suite Pro
This training isn’t about Web hacking. Instead, this training is for Web hackers who want to master their toolbox.
Burp Suite Pro is the leading tool for auditing Web applications at large, but also a complex beast where new features get added every few weeks. Mastering Burp Suite Pro, including its newest features, allows testers to get the most out of the tool, optimizing time spent auditing and testing. Work will be faster (hotkeys!) and much more efficient (more tools, more possibilities!). Attendees will also learn to measure and assess the quality of their attacks, a crucial skill in real-life engagements that can make the difference between a false-negative and a critical finding.
Classes are limited. Get registered!
Learn the following key skills:
Students should have:
Intermediate to Advanced
Columbia, MD and San Francisco, CA
The training is aimed at Web application penetration testers and bug hunters, and will provide them with significant automation capabilities. We aim at a fast and comfortable testing workflow with as-short-as-possible feedback loops.
Why choose the Center for Cyber Security Training
Interactive, classroom-based learning
Subject matter experts
Trusted by US government agencies
I’ve been using BurpSuite for years but Agarri showed that I’ve never used more than 5% of the tool. Thanks for that awesome training!
Want more information?
Download Agarri's "Burp Suite Pro" course outline now.
Upcoming Training Sessions
San Francisco, CA - March 8-11, 2021 Columbia, MD - July 19-22, 2021
Classes are limited.
Our classroom delivers the most in-demand content from the highest profile subject matter experts. Intense and interactive, our courses prepare students with actionable insight and proven strategies.
Corelan® Exploit Development: Advanced
Our four-day advanced course will teach students how the Windows 7 and Windows 10 Heap Manager works, and how to write exploits for complex heap-related memory corruptions for the Win32 platform in a fast-paced, interactive learning environment. Master the techniques you need to succeed in the field.
Tactical Exploitation: Windows/Unix
In this intense five-day course, students will learn a variety of covert techniques used to enter secure commercial facilities. From lock picking and key decoding to RFID cloning and alarm sensor bypassing, students who demonstrate hands-on proficiency in key tactics will earn a Certificate of Completion.