website security check



 Source Code review is a technique to find a weakness and bugs in source code..Source code review is a single most effective techniques for identifying security flaws when used together automated tool and manual penetration testing ,code review can significantly increase the cost effectiveness of an application security verification effort


What is a source code review?

Source Code Review means to find the error and  bugs  in  source code . It is a most important technique to find errors and bugs to make it a right code ,source to review is the  part of any software to create the secure and bugs free software and it also helps in secure transactions

Source code review is provide a guideline and to solve the error and bugs .basically source code review tools to check the predefined error


  1. Data Validation
  2. Authentication
  3. Session management
  4. Authorization
  5. Cryptography
  6. Error handling
  7. Logging
  8. Security Configuration
  9. Network Architecture



Welcome to our CRAW Security. We are glad to have you around.

Phone : +91-9650202445, 011-40394315



First Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate,Westend Marg,Behind Saket metro station, New Delhi 110030


Top 10 Web Application Security Course

Top 10 Web Application Security Course

Craw Security provide by Web Application Security Course . This Course will be defined by Web Application Security Course in Delhi, The quality and important data web Application is Process will cover … Web application security involves the security of websites and web applications. The principles of application security is applied primarily to the Internet and Web systems. This will be followed by an introduction to web application security and its dissimilarity to network security. Web Application Security (WAS) testing will be explained and defined. Tips on securing your web application will also be studied in this course.

 Course Module

  • Module 1- SQL Injection Flaws
  • Module 2- Crass Site Scripting Flaw
  • Module  3- Source Code Disclosure Flaw
  • Module 4- OS Command  Injection Flaw
  • Module 5- Broken Authentication
  • Module 6- File Upload Vulnerability
  • Module 7- Cross Site Request Forgery
  • Module 8- Sensitive Data Exposure
  • Module 9- Remote File Inclusion
  • Module 10- Directory Traversal Attacks
  • Module 11- Invalid Redirection Flaw
  • Module 12 – Security Mis-Configuration
  • Module  13- Misising Authorization
  • Module 14- Session Fixation
  • Module 15- Weak Data Encryption
  • Module 16- Information Leakage
  • Module 17- Dangerous File  Upload
  • Module 18- Transport Level Communication
  • Module 19- Invalid URL Redirection  Flaw
  • Module 20- Security Mis-Configuration
  • Module 21- Insecure Direct Object Reference

Extra Features

  • Weekend and Weekdays Training
  • Classroom and Online Training
  • 80% Practical and 20% Theortical
  • Internship Opportunity
  • Top 10 OWASP Training
  • Burpsuit/Proxy Interception
  • Vulnerable Web Application Exploration

Course Detail

  • Duration- 45 Days
  • Lecture- 2hrs/3hrs
  • Skill Level- All level



011-40394315 | +91-9650202445 | +91-9650677445


Head Office

1st Floor, Plot no. 4, Lane no. 2, Kehar Singh Estate, Westend Marg, Behind Saket Metro Station, New Delhi – 110030