

.png)
CyberX
The Next-Gen Security Series
Hosted by Centre of Cybersecurity, School of Computer Science, UPES, Dehradun
Saturday,
01 November 2025
Powered by Mile2.
Learn from the Best, Train for the Future.
Mr. Krapesh Bhatt,
Cybersecurity Consultant & Senior Trainer
Cybersecurity Expert at Mile2 Asia
06:00 PM - 07:00 PM (IST)

.webp)
CyberX
Defensive Shield
Web Application Security
Build Resilience Against Modern Web Attacks
In a world where web applications power businesses, education, and daily life, securing them is no longer optional - it’s essential.
CyberX: Defensive Shield (Web Application Security) is designed to equip participants with practical defensive strategies, secure architecture principles, and hands-on knowledge to safeguard modern web applications from real-world cyber threats.
This workshop takes you beyond theory into applied defensive security, combining foundational knowledge, industry frameworks, and real attack scenarios to help you think and act like a seasoned Blue Team professional.
Saturday,
01 November 2025

06:00 PM - 08:00 PM (IST)
Topics Covered
Web Application Security
1. C-I-A Triad – Conceptual Primer
Understand the fundamental pillars of security: Confidentiality, Integrity & Availability.
2. Essential Concepts – Threat, Risk & Vulnerability
Gain clarity on core security terminology used in security assessments.
3. Security Basics – CVE, CWE & CVSS
Learn how vulnerabilities are classified, scored, and tracked worldwide.
4. Security Controls
Explore preventive, detective, and corrective controls essential for secure systems.
5. Secure Software Development Models
Understand SDLC, Secure SDLC, and secure coding practices followed by enterprises.
6. Web Application Security Architecture
Learn key architectural components required to protect web applications.
7. Defense-in-Depth & Zero Trust Architecture + OWASP Top 10
Master modern frameworks and the most critical web risks recognized globally.
8. Risk Management Concepts
Build the ability to identify, evaluate, and treat security risks effectively.
9. Threat Modeling with STRIDE & DREAD Models
Understand attacker perspectives and anticipate threats before exploitation.
10. Root Cause Analysis Models
Learn to analyze security issues and prevent repeated failures in systems.
11. Web Application Attacks
Hands-on coverage of:
- 
Authentication & Authorization attacks 
- 
Session management attacks 
- 
Data validation & Injection attacks 
- 
Business logic attacks 
- 
Attacks targeting web servers 


Why This Program
is Different
- 
Learn web application defence techniques used by modern Blue Teams 
- 
Understand real-world attack patterns & secure architecture countermeasures 
- 
Gain practical exposure to OWASP Top 10, Zero Trust & STRIDE/DREAD models 
- 
Build hands-on skills in identifying, assessing, and mitigating web risks 
- 
Earn recognition and certification from GCA Learning & Mile2 


