• 1
  • 2
  • 3
  • 4
  • Security Training
  • Are you hacked? Get helpTop
  • Security AuditingMore

Web security Training

TRAINING FROM   30th – 31st May 2014

Twiga Hosting Ltd is the ICT security training provider in Tanzania.
Currently 80% of websites and web applications are vulnerable to security threats including the government’s and non-government’s websites.:  Web security Training

Target: ‘Chief Executive Officers, Directors, Managers, Lawyers, ICT specialists, System administrators & other officers in the organizations.'

Facilitator: Train will be facilitated by experienced resource people with in-depth knowledge in information security. more info>>

If you are a victim of being hacked in your website or web system applications do not get heartbroken or getting the cost of developing the new applications.
Twiga Hosting Ltd through our highly experienced experts in preventing the websystems attacks can revive your original application. Please Contact us when you need our assistance. more info>>

Inadequate auditing in website and web applications  is a problem that many Web developers are facing. Perhaps it is lack of standards security auditing.

Twiga Hosting Ltd come up with the solution to solve those issues by establishing a standard auditing procedures by which we measure your security, by testing  your own Web site's authentication scheme and see how it stands the hacking attacks.

more info>>

Help & Tips

  • Cross Site Scripting (XSS) +

    Cross Site Scripting(XSS) is common web application vulnerability occur when an attacker uses a web application to send malicious code.
  • Outdated Programs Exploitation +

    Hackers uses security vulnerability in old version systems for exploitation.
  • Cookie/Session Hijacking +

    The attacker capture a valid “Session ID”, then he uses the token session to gain unauthorized access to the Web Server without user-name or password.  
  • Phishing +

    Phishing is the act of attempting to acquire users private information such as credit card details by pretending as legitimate entity in an electronic communication.  
  • SQL Injection Attacks +

    SQL Injection attacks are attacks aimed at exploiting databases. This lead to operating system attack and take over control.
  • Shell Scripts Upload +

    This is uploading malicious script to web server and use the shell to exploit the whole server.
  • Brute Force/Dictionary Attack +

    A dictionary attack uses a targeted technique of successively trying all the words in an exhaustive list called a dictionary (from a pre-arranged list of values)
  • 1
  • 2



  • Main types of websites and web systems attacks.
  • Solutions for preventing websites and web applications from being hacked.
  • Common mistakes in web technology that introduces security holes in
      websites and web systems.
  • How Hackers Detect existence of security holes in Websites or Web systems