Targeted Equipment Interference
Web Application Attack
COURSE AIM
The aim of this programme is to train participants how to identify vulnerabilities and conduct attacks against web based servers, databases and applications. On completion of this training, participants will have learnt a number of key exploitation techniques which can be used to compromise web based apparatus.
Register for further details
Additional information and enrolment for our clandestine, security, and covert intelligence‑gathering training packages are strictly restricted. To proceed, users must first register an account and submit their details for review. All applications are assessed to ensure suitability and alignment with our operational and security requirements. Access to further information and training materials is granted only following account approval, which may be issued at our discretion.