Certified AppSec Pentesting eXpert

Certified Cloud Pentesting eXpert-AWS

Certified AppSec Pentesting eXpert
(CAPenX)

Certified AppSec Pentesting eXpert (CAPenX) is an expert-level exam to test a candidate’s knowledge of the core concepts involving application security. Candidates must be able to demonstrate practical knowledge to conduct an application pentest to pass this exam.

  • Practical
  • 7 Hours
  • Online
  • On-demand
  • Real world pentesting scenarios
£400

Our Candidates Say it Best

Hernan Rodriguez

Hernan Rodriguez

Senior Offensive Cybersecurity | Red Team | eCPTX | CRTSv2 | CAPenX

I share with you my achievement in certification Certified AppSec Pentesting eXpert (CAPenX) of The SecOps Group. It is an exam for people with extensive knowledge and require out-of-band techniques, I failed the first attempt. This made me practice and learn new attack models to perform this second attempt and obviously practicing in my professional days as a pentester. Thank you very much for this excellent professional challenge The SecOps Group.

Joas A Santos

Joas A Santos

Red Team | Author of Books | Speaker and Teacher | APT Hunting | CAPenX

The challenges were really cool at first, I started solving some quickly, but then it got difficult and I ended up speeding up to try to rest, but 7 hours of testing are enough to solve them all! In total there are 10 questions and each one has a greater weight than the other, so if you are going to dedicate yourself at the beginning, focus on the ones that have more weight in the score, something I didn't do at the beginning. Well, if you want to prepare yourself beforehand, do some labs from portswigger labs, basic explorations in AWS, API exploration and evasion techniques in web explorations (SSRF, XSS, SQL Injection, etc.) That's it, again I congratulate The SecOps Group, you are certainly at my top as companies I recommend for certification and your innovative model.

Tyler Boykin

Tyler Boykin

Principal Pentester at Oracle, OSCE | OSCP | CISSP | CCNP Ent. | CAPenX

I’m happy to share that I’ve obtained a new certification: Certified AppSec Pentesting eXpert (CAPenX) from The SecOps Group! This one was quite a bit challenging and I learned some neat stuff attempting it and trying to solve its puzzles. A diverse array of topics. Thanks for the attempt Sumit Siddharth!

Who should take this exam?

CAPenX is intended to be taken by pentesters, application security architects, red and blue team members, and any AppSec enthusiast, who wants to evaluate and advance their knowledge.

What is the format of the Exam?

CAPenX is an intense 7 hours long practical exam. It requires candidates to solve a number of challenges, identify and exploit various vulnerabilities, and obtain flags. The exam can be taken online, anytime (on-demand), and from anywhere. Candidates will need to connect to the exam VPN server to access the vulnerable applications.

What is the pass criteria for the exam?

The pass criteria are as follows:

  • Candidates scoring over 60% marks will be deemed to have successfully passed the exam.
  • Candidates scoring over 75% marks will be deemed to have passed with merit.

What is the experience needed to take the exam?

This is an expert-level exam. Candidates should have prior knowledge and experience in application pentesting. They should understand common application security-related topics such as the OWASP Top 10, commonly identified security misconfigurations, and best security practices. They should be able to demonstrate their practical knowledge of AppSec topics by completing a series of tasks on identifying and exploiting vulnerabilities that have been created in the exam environment to mimic real-world scenarios.

Note: As this is an expert-level exam, a minimum of five years of professional pentesting/bug-bounty experience is recommended.

What will the candidates get after the exam?

On completing the exam, each candidate will receive:

  • A certificate with their pass/fail and merit status.
  • The certificate will contain a code/QR link, which can be used by anyone to validate the certificate.

What is the exam retake policy?

Candidates, who fail the exam, are allowed 1 free exam retake within the exam fees.

What are the benefits of this exam?

The exam will allow candidates to demonstrate their skills in application pentesting. This will help them to advance in their career.

How long is the certificate valid for?

The certificate does not have an expiration date. However, the passing certificate will mention the details of the exam such as the exam version and the date. As the exam is updated over time, candidates should retake the newer version as per their convenience.

Will you provide any training that can be taken prior to the exams?

Being an independent certifying authority, we (The SecOps Group) do not provide any training for the exam. Candidates should carefully go over each topic listed in the syllabus and make sure they have adequate understanding, required experience, and practical knowledge of these topics. Further, the following independent resources can be utilised to prepare for the exams.

Learning Resources

Portswigger

Free/Paid:free

Type:Training

Kontra

Free/Paid:free

Type:Training

Kontra

Free/Paid:free

Type:Training

OWASP

Free/Paid:free

Type:Training

Tryhackme

Free/Paid:free

Type:Training

Hackthebox

Free/Paid:both

Type:Training

Vulnhub

Free/Paid:free

Type:Training

Vulnmachines

Free/Paid:free

Type:Training

INE

Free/Paid:free

Type:Training

Cybrary

Free/Paid:paid

Type:Training

Pentesterlab

Free/Paid:both

Type:Training

Altoro Mutual

Free/Paid:free

Type:Training

Pentest Lab

Free/Paid:free

Type:Training

DVWA

Free/Paid:free

Type:Training

checkmarx

Free/Paid:free

Type:Training

Hacksplaining

Free/Paid:free

Type:Training

Hellboundhackers

Free/Paid:free

Type:Training

Hacker Test

Free/Paid:free

Type:Training

Seedlabs

Free/Paid:free

Type:Training

attackdefense.com

Free/Paid:free

Type:Training

Pwnable

Free/Paid:free

Type:Training

pwn college

Free/Paid:free

Type:Training

pwn.tn

Free/Paid:free

Type:Training

247ctf

Free/Paid:free

Type:Training

revolutionelite

Free/Paid:free

Type:Training

hacking-challenges

Free/Paid:free

Type:Training

warzone.elhacker

Free/Paid:free

Type:Training

webhacking.kr

Free/Paid:free

Type:Training

hacker101

Free/Paid:free

Type:Training

zenk-security

Free/Paid:free

Type:Training

White-box-pentesting

Free/Paid:free

Type:Training

penlab

Free/Paid:free

Type:Training

portainer-pentest-lab

Free/Paid:free

Type:Training

APISandbox

Free/Paid:free

Type:Training

crAPI

Free/Paid:free

Type:Training

Damn-Vulnerable-GraphQL-Application

Free/Paid:free

Type:Training

Generic-University

Free/Paid:free

Type:Training

node-api-goat

Free/Paid:free

Type:Training

Pixi

Free/Paid:free

Type:Training

poc-graphql

Free/Paid:free

Type:Training

rest-api-goat

Free/Paid:free

Type:Training

VAmPI

Free/Paid:free

Type:Training

vapi

Free/Paid:free

Type:Training

vulnapi

Free/Paid:free

Type:Training

sqli-labs

Free/Paid:free

Type:Training

xvwa

Free/Paid:free

Type:Training

Exam Syllabus

Google Hacking, Dorking, and OSINT techniques

Identification and exploitation of OWASP Top 10 Vulnerabilities

Cross-Site Scripting

SQL Injection

XML External Entity attack

Cross-Site Request Forgery

Practical Cryptographic Attacks

Deserialization

DeserializationMass Assignment

Authentication related Vulnerabilities

  • Brute force Attacks
  • Username Enumeration

TLS Security

  • Identification of TLS security Misconfigurations

Server-Side Request Forgery

Authorization and Session Management related Flaws -

  • Insecure Direct Object Reference (IDOR)
  • Parameter Manipulation Attacks

Insecure File Uploads

Business Logic Flaws

Directory Traversal Vulnerabilities

Common Security Misconfigurations

Information Disclosure

Common Vulnerabilities and Exposures

Vulnerable and Outdated Components

Common Supply Chain Attacks and Prevention Methods

Common Security Weaknesses affecting Cloud Services such as an S3 Bucket

Security Best Practices and Hardening Mechanisms

  • Security Headers

HTTP Request Smuggling

Server Side Template Injection

Web Cache Poisoning/Deception

Host-Header Injection

Prototype Pollution

CRLF & Response Splitting

File Inclusion