This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Manila/SchoolTour"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
==== When ====
 
==== When ====
13 Feb 2015 8:00 Am Philippines time (UTC+08:00)<br>
+
14 March 2015 8:00 Am - 5:00 Pm Philippines time (UTC+08:00)<br>
  
 
==== Where ====
 
==== Where ====
 +
Bulacan State University Main Campus, Malolos Bulacan<br>
  
Feb 27 - San Sebastian College-Recoletos de Cavite, Manila-Cavite Road, Sta.Cruz, Cavite City<br>
+
==== Topics ====
  
 +
Morning Session:<br>
 +
OWASp Top 10 Risk Vulnerability<br>
  
==== Topics ====
+
Afternun Session:<br>
 
+
WebAppSec Laboratory Demonstration<br>
1.Security Fundamentals<br>
+
Web Application Security Challenges<br>
2.OWASP Top 10 Web App Vulnerabilities<br>
 
3.Web Application Security<br>
 
  
 
==== Overview ====
 
==== Overview ====
  
We will Discuss Security Fundamentals with Core Security and Physical Security and we will also Discuss OWASP TOP 10<br>
+
The [https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project Hackademic Challenges] implement realistic scenarios with known vulnerabilities in a safe, controllable environment. Users can attempt to discover and exploit these vulnerabilities in order to learn important concepts of information security through the attacker's perspective.
and Web Application Security  and how to produce a bug. This project is part of the cyber Security Campaign of OWASP Manila.
 

Revision as of 17:48, 9 March 2015

When

14 March 2015 8:00 Am - 5:00 Pm Philippines time (UTC+08:00)

Where

Bulacan State University Main Campus, Malolos Bulacan

Topics

Morning Session:
OWASp Top 10 Risk Vulnerability

Afternun Session:
WebAppSec Laboratory Demonstration
Web Application Security Challenges

Overview

The Hackademic Challenges implement realistic scenarios with known vulnerabilities in a safe, controllable environment. Users can attempt to discover and exploit these vulnerabilities in order to learn important concepts of information security through the attacker's perspective.