{"id":17592,"date":"2025-05-30T17:25:58","date_gmt":"2025-05-30T15:25:58","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?post_type=mec-events&#038;p=17592"},"modified":"2026-03-02T17:37:30","modified_gmt":"2026-03-02T16:37:30","slug":"preparation-offensive-security-web-expert-oswe","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/preparation-offensive-security-web-expert-oswe\/","title":{"rendered":"Offensive Security Web Expert (OSWE) preparation"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"17592\" class=\"elementor elementor-17592\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-322b389 e-flex e-con-boxed e-con e-child\" data-id=\"322b389\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5261bc4 e-flex e-con-boxed e-con e-child\" data-id=\"5261bc4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7127562 e-con-full e-flex e-con e-child\" data-id=\"7127562\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a958331 elementor-widget elementor-widget-image\" data-id=\"a958331\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/cropped-2-removebg-preview-1-300x300.png\" class=\"attachment-medium size-medium wp-image-14365\" alt=\"\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/cropped-2-removebg-preview-1-300x300.png 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/cropped-2-removebg-preview-1-150x150.png 150w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/cropped-2-removebg-preview-1-500x500.png 500w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/cropped-2-removebg-preview-1-270x270.png 270w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/cropped-2-removebg-preview-1-192x192.png 192w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/cropped-2-removebg-preview-1-180x180.png 180w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/cropped-2-removebg-preview-1-32x32.png 32w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/cropped-2-removebg-preview-1.png 512w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19386d8 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"19386d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e85162 elementor-widget elementor-widget-spacer\" data-id=\"8e85162\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66b4040 e-flex e-con-boxed e-con e-child\" data-id=\"66b4040\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d6daf6 elementor-widget elementor-widget-heading\" data-id=\"7d6daf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The target audience for training\n\n\n\n\n\n\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3489ddc elementor-widget elementor-widget-text-editor\" data-id=\"3489ddc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Experienced penetration testers wishing to learn more about web application security audits.<\/li>\n<li>Specialists in web application security.<\/li>\n<li>Web developers looking to enhance their security skills.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d811ef2 e-flex e-con-boxed e-con e-child\" data-id=\"d811ef2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e9960e0 elementor-widget elementor-widget-heading\" data-id=\"e9960e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What you will learn<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3a6ffe elementor-widget elementor-widget-text-editor\" data-id=\"c3a6ffe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Preparation for Offensive Security Web Expert (OSWE) certification will enable you to master advanced penetration testing techniques specific to web applications. You will learn how to identify and exploit complex vulnerabilities in web environments, focusing on source code analysis, exploitation of logical flaws and manipulation of application flows. This course will focus on an in-depth understanding of the internal mechanisms of web applications, as well as the ability to develop custom exploits to demonstrate compromise. As a result, you will develop in-depth expertise in effectively securing web applications against targeted attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e82462 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3e82462\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4688ff7 elementor-widget elementor-widget-heading\" data-id=\"4688ff7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training programme\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15aa12d elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"15aa12d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-hourglass-half\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Duration: 5 days<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e45d46 elementor-widget elementor-widget-text-editor\" data-id=\"5e45d46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li><strong>Introduction and methodology<\/strong>\n<ul>\n<li>Presentation of the AWAE course.<\/li>\n<li>Teaching approach and objectives.<\/li>\n<li>Use of AWAE laboratories.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>Tools and methodologies<\/strong>\n<ul>\n<li>Web traffic inspection with Burp Suite.<\/li>\n<li>Interaction with web headphones via Python.<\/li>\n<li>Source code recovery and analysis.<\/li>\n<li>Source code analysis methodology.<\/li>\n<li>Debugging and remote debugging.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<ul>\n<li><strong>Practical case studies<\/strong><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>ATutor: authentication bypass and remote code execution.<\/li>\n<li>ATutor LMS: juggling vulnerability.<\/li>\n<li>ManageEngine Applications Manager: SQL injection and RCE.<\/li>\n<li>Bassmaster NodeJS: arbitrary JavaScript injection.<\/li>\n<li>DotNetNuke: deserialization of cookies and RCE.<\/li>\n<li>ERPNext: authentication bypass and SSTI.<\/li>\n<li>openCRX: authentication bypass and remote code execution.<\/li>\n<li>openITCOCKPIT: XSS and OS command injection.<\/li>\n<li>Concord: authentication bypass to RCE.<\/li>\n<li>Guacamole Lite: JavaScript prototype pollution.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c7b59d e-flex e-con-boxed e-con e-child\" data-id=\"1c7b59d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b2b2b27 e-flex e-con-boxed e-con e-child\" data-id=\"b2b2b27\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55da9ff elementor-widget elementor-widget-heading\" data-id=\"55da9ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Training objectives<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0306fbc elementor-widget elementor-widget-text-editor\" data-id=\"0306fbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Master advanced security audit techniques for web applications in a white-box environment.<\/li>\n<li>Identify and exploit complex vulnerabilities using source code analysis.<\/li>\n<li>Developing custom operating scripts for web applications.<\/li>\n<li>Preparing for and passing the OSWE certification exam.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c25c2d e-flex e-con-boxed e-con e-child\" data-id=\"3c25c2d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12fbd65 elementor-widget elementor-widget-heading\" data-id=\"12fbd65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Training prerequisites\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ebb200e elementor-widget elementor-widget-text-editor\" data-id=\"ebb200e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul>\n<li>Comfortable reading and writing at least one programming language (PHP, Java, C#, JavaScript).<\/li>\n<li>Familiarity with Linux.<\/li>\n<li>Ability to write simple scripts in Python, Perl, PHP or Bash.<\/li>\n<li>Experience with web proxies (e.g. Burp Suite).<\/li>\n<li>General understanding of web application attack vectors.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-566055d elementor-widget elementor-widget-spacer\" data-id=\"566055d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f823660 elementor-widget__width-auto elementor-widget elementor-widget-button\" data-id=\"f823660\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2026\/03\/Preparation-Offensive-Security-Web-Expert-OSWE.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">See the brochure for this course<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>L&rsquo; audience cibl\u00e9e par la formation Testeurs d&rsquo;intrusion exp\u00e9riment\u00e9s souhaitant approfondir l&rsquo;audit de s\u00e9curit\u00e9 des applications web. Sp\u00e9cialistes en s\u00e9curit\u00e9 des applications web. D\u00e9veloppeurs web souhaitant renforcer leurs comp\u00e9tences en s\u00e9curit\u00e9. Ce que vous allez apprendre La pr\u00e9paration \u00e0 la certification Offensive Security Web Expert (OSWE) vous permettra de ma\u00eetriser les techniques avanc\u00e9es de test [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":13183,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[92],"duree":[153],"examen":[146],"langue":[144],"niveau":[129],"formateur":[100],"mec_category":[101],"class_list":["post-17592","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-non","duree-5-jours","examen-oui","langue-francais","niveau-intermediare","formateur-acg-cyberacademy","mec_category-securite-technique"],"acf":{"taux_davis_etoile":4.5,"taux_de_reussite":4.7,"formation_populaire":false,"lien_guide_dexamen":"","liste_importance_formations":5},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pr\u00e9paration Offensive Security Web Expert (OSWE) - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Formation pratique ACG CyberAcademy pour r\u00e9ussir l\u2019OSWE : audit \u00ab white-box \u00bb, analyse de code, exploitation web avanc\u00e9e.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/preparation-offensive-security-web-expert-oswe\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pr\u00e9paration Offensive Security Web Expert (OSWE) - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Formation pratique ACG CyberAcademy pour r\u00e9ussir l\u2019OSWE : audit \u00ab white-box \u00bb, analyse de code, exploitation web avanc\u00e9e.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/preparation-offensive-security-web-expert-oswe\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-02T16:37:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Catalogue-2024-v04-31.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1615\" \/>\n\t<meta property=\"og:image:height\" content=\"1084\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/preparation-offensive-security-web-expert-oswe\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/preparation-offensive-security-web-expert-oswe\\\/\",\"name\":\"Pr\u00e9paration Offensive Security Web Expert (OSWE) - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/preparation-offensive-security-web-expert-oswe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/preparation-offensive-security-web-expert-oswe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Catalogue-2024-v04-31.jpg\",\"datePublished\":\"2025-05-30T15:25:58+00:00\",\"dateModified\":\"2026-03-02T16:37:30+00:00\",\"description\":\"Formation pratique ACG CyberAcademy pour r\u00e9ussir l\u2019OSWE : audit \u00ab white-box \u00bb, analyse de code, exploitation web avanc\u00e9e.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/preparation-offensive-security-web-expert-oswe\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/preparation-offensive-security-web-expert-oswe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/preparation-offensive-security-web-expert-oswe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Catalogue-2024-v04-31.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Catalogue-2024-v04-31.jpg\",\"width\":1615,\"height\":1084,\"caption\":\"Formation pratique ACG CyberAcademy pour r\u00e9ussir l\u2019OSWE : audit \u00ab white-box \u00bb, analyse de code, exploitation web avanc\u00e9e.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/preparation-offensive-security-web-expert-oswe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Pr\u00e9paration Offensive Security Web Expert (OSWE)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pr\u00e9paration Offensive Security Web Expert (OSWE) - ACG CyberAcademy","description":"Formation pratique ACG CyberAcademy pour r\u00e9ussir l\u2019OSWE : audit \u00ab white-box \u00bb, analyse de code, exploitation web avanc\u00e9e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/preparation-offensive-security-web-expert-oswe\/","og_locale":"en_GB","og_type":"article","og_title":"Pr\u00e9paration Offensive Security Web Expert (OSWE) - ACG CyberAcademy","og_description":"Formation pratique ACG CyberAcademy pour r\u00e9ussir l\u2019OSWE : audit \u00ab white-box \u00bb, analyse de code, exploitation web avanc\u00e9e.","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/preparation-offensive-security-web-expert-oswe\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2026-03-02T16:37:30+00:00","og_image":[{"width":1615,"height":1084,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Catalogue-2024-v04-31.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/preparation-offensive-security-web-expert-oswe\/","url":"https:\/\/acgcyberacademy.fr\/events\/preparation-offensive-security-web-expert-oswe\/","name":"Pr\u00e9paration Offensive Security Web Expert (OSWE) - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/preparation-offensive-security-web-expert-oswe\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/preparation-offensive-security-web-expert-oswe\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Catalogue-2024-v04-31.jpg","datePublished":"2025-05-30T15:25:58+00:00","dateModified":"2026-03-02T16:37:30+00:00","description":"Formation pratique ACG CyberAcademy pour r\u00e9ussir l\u2019OSWE : audit \u00ab white-box \u00bb, analyse de code, exploitation web avanc\u00e9e.","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/preparation-offensive-security-web-expert-oswe\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/preparation-offensive-security-web-expert-oswe\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/preparation-offensive-security-web-expert-oswe\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Catalogue-2024-v04-31.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Catalogue-2024-v04-31.jpg","width":1615,"height":1084,"caption":"Formation pratique ACG CyberAcademy pour r\u00e9ussir l\u2019OSWE : audit \u00ab white-box \u00bb, analyse de code, exploitation web avanc\u00e9e."},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/preparation-offensive-security-web-expert-oswe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"Pr\u00e9paration Offensive Security Web Expert (OSWE)"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=17592"}],"version-history":[{"count":13,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17592\/revisions"}],"predecessor-version":[{"id":22617,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17592\/revisions\/22617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/13183"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=17592"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=17592"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=17592"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=17592"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=17592"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=17592"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=17592"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=17592"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=17592"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=17592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}