×
Phoenix TS

Burp Suite Training

This Burp Suite Training course is designed to show students how to effectively leverage the Burp Suite tool in their cybersecurity efforts.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

Our 3-day, instructor-led Burp Suite Training course combines lecture and exercises to teach students the following:

  • How to perform security tests on web applications using Burp
  • How to use different components of Burp Suite including Proxy, Intruder, Scanner, and Repeater
  • To customize Burp Extensions when using Java, Python, and Ruby

Before taking this course, students should have minimal to significant experience with web applications.

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

Getting Started with Burp

  • Starting Burp form the command line
  • Specifying memory size for Burp
  • Ensuring that IPv4 is allowed
  • Working with other JVMs

Configuring Browsers to Proxy through Burp

  • Configuring widely used browsers to proxy through Burp Suite

Setting the Scope and Dealing with Upstream Proxies

  • Multiple ways to add targets to the scope
  • Scope and Burp Suite tools
  • Scope inclusion versus exclusion
  • Dropping out-of-scope requests
  • Dealing with upstream proxies and SOCKS proxies

SSL and Other Advanced Settings

  • Importing the Burp certificate in Mozilla Firefox
  • Importing the Burp certificate in Microsoft IE and Google Chrome
  • Installing the Burp certificate in iOS or Android
  • SSL pass-through
  • Invisible Proxy

Using Burp Tools as a Power User

  • Target
  • Proxy
  • The Message Analysis tab
  • Actions on the intercepted requests
  • Intruder
  • Scanner
  • Repeater
  • Spidering
  • Sequencer
  • Decoder
  • Comparer
  • Alerts

Searching, Extracting, Pattern Matching

  • Filtering
  • Matching
  • Grep – match and grep – extract

Using Engagement Tools and Other Utilities

  • Search
  • Target analyzer
  • Content discovery
  • Task scheduler
  • CSRF proof of concept generator

Using Burp Extensions and Writing Your Own

  • Setting up the Python runtime for Burp Extensions
  • Setting up the Ruby environment for Burp Extensions
  • Loading and installing a Burp Extension from the Burp App Store
  • Loading and installing a Burp Extension manually
  • Managing Burp Extensions
  • Writing our own Burp Extensions
  • Noteworthy Burp Extensions

Saving Securely, Backing up, and other Maintenance Activities

  • Saving and restoring a state
  • Automatic backups
  • Scheduled tasks
  • Logging all activities

Resources, References and Links

  • Primary references
  • Web application security testing with Burp
  • Miscellaneous security testing tutorials with Burp Suite
  • Pentesting thick clients
  • Testing mobile applications for web security using Burp Suite
  • Extensions references
  • Books

Burp Suite Training FAQs

Who should take this class?


This class is ideal for Security Analysts, SOC Analysts/Team Leads and Network and Information Security Managers.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)