|
|
| (One intermediate revision by the same user not shown) |
| Line 7: |
Line 7: |
| | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Description''' | | | style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" colspan="0" | '''Description''' |
| | |- | | |- |
| − | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 1 day training <br> 12th of October<br>daily: 9:00 - 17:00<br><br> | + | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 1 day training <br> 11th of October<br>daily: 9:00 - 17:00<br><br> |
| | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | OWASP Top 10 vulnerabilities – discover, exploit, remediate<br> | | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | OWASP Top 10 vulnerabilities – discover, exploit, remediate<br> |
| | | | |
| Line 32: |
Line 32: |
| | *Administrative rights on the laptop | | *Administrative rights on the laptop |
| | *VMWare Player installed | | *VMWare Player installed |
| − | '''Seats available: '''20 (first-come, first served)<br>
| |
| − | '''Price: '''400 euros/person <br>
| |
| − | [https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2017-tickets-35356670754 Register here]
| |
| − | |-
| |
| − | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 1 day training <br> 12th of October<br>daily: 9:00 - 17:00<br><br>
| |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Time critical DFIR: Key playbooks, techniques and tools for time-pressured investigations of security incidents<br>
| |
| − |
| |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | [https://ro.linkedin.com/in/cteodor Teodor Cimpoesu] - Senior Manager Cyber Risk Advisory
| |
| − | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" | '''Description:''' This course provides responders and threat hunting teams with advanced skills to hunt down, identify, counter, and recover from a wide range of threats within enterprise networks.<br>
| |
| − |
| |
| − | Topics:
| |
| − | *Use of a wide range of best-of-breed open-source tools to perform incident response and digital forensics
| |
| − | *Threat hunting techniques that will aid in quicker identification of breaches
| |
| − | *Rapid incident response analysis and breach assessment
| |
| − | *Incident response and intrusion forensics methodology
| |
| − | *Rapid and deep-dive timeline creation and analysis
| |
| − | *Discovery of unknown malware on a system
| |
| − | *Cyber-kill chain strategies
| |
| − | '''Intended audience:''' Digital Forensic Analysts, IR Team Members, Penetration Testers, Exploit Developers, Red Team members <br>
| |
| − | '''Skill level: ''' Prior minimum Cybersecurity experience. <br>
| |
| − | '''Requirements:''' This course will contain a hands-on component, so attendees should bring their own laptop with at least 4 GB RAM, i5 processor, 40 GB available storage, virtualization software (VMware Workstation Player).<br>
| |
| − | '''Seats available: '''20 (first-come, first served)<br>
| |
| − | '''Price: '''500 euros/person <br>
| |
| − | [https://www.eventbrite.com/e/owasp-bucharest-appsec-conference-2017-tickets-35356670754 Register here]
| |
| − | |-
| |
| − | | style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | 1 day training <br> 11th of October<br>daily: 9:00 - 17:00<br><br>
| |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Introduction to Metasploit Framework<br>
| |
| − |
| |
| − | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | [https://ro.linkedin.com/in/adrianifrim Adrian Ifrim] - Senior Consultant Cyber Risk Services
| |
| − | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" | '''Description:''' Metasploit is one, if not the most, widely used tool for penetration testing, providing powerful attack simulations, security assessment management, and post exploitation resources. Metasploit’s capabilities are wide, and this class will help you to prepare to run vulnerability assessments for organizations of any size.<br>In this course, we will teach how to use Metasploit to enumerate available services, identify potential weaknesses, test vulnerabilities through exploitation, and gather evidence for reporting. You will learn how to install and configure the Metasploit Framework and several supporting tools on Kali Linux. At the end of the course you will have a better understanding on how exploits and payloads work together to gain access to systems.<br>
| |
| − | '''Intended audience:''' Penetration testers, Vulnerability assessment personnel, Auditors, Security engineers, Security researchers <br>
| |
| − | '''Skill level: '''Basic knowledge of Networking, Windows, Linux. <br>
| |
| − | '''Requirements:''' The attendees should bring their own laptop with at least 4GB RAM, i5 processor, 40GB storage space, virtualization software (VMware Workstation Player).<br>
| |
| | '''Seats available: '''20 (first-come, first served)<br> | | '''Seats available: '''20 (first-come, first served)<br> |
| | '''Price: '''400 euros/person <br> | | '''Price: '''400 euros/person <br> |