This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Bucharest AppSec Conference 2017 Training1"
Oana Cornea (talk | contribs) (edit2) |
Oana Cornea (talk | contribs) |
||
| Line 39: | Line 39: | ||
| style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Time critical DFIR: Key playbooks, techniques and tools for time-pressured investigations of security incidents<br> | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | Time critical DFIR: Key playbooks, techniques and tools for time-pressured investigations of security incidents<br> | ||
| − | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | [https://ro.linkedin.com/in/cteodor Teodor Cimpoesu] | + | | style="width:25%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" colspan="0" | [https://ro.linkedin.com/in/cteodor Teodor Cimpoesu] - Senior Manager Cyber Risk Advisory |
| style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" | '''Description:''' This course provides responders and threat hunting teams with advanced skills to hunt down, identify, counter, and recover from a wide range of threats within enterprise networks.<br> | | style="width:40%" valign="middle" height="30" bgcolor="#CCEEEE" align="justify" colspan="0" | '''Description:''' This course provides responders and threat hunting teams with advanced skills to hunt down, identify, counter, and recover from a wide range of threats within enterprise networks.<br> | ||
| Line 50: | Line 50: | ||
*Discovery of unknown malware on a system | *Discovery of unknown malware on a system | ||
*Cyber-kill chain strategies | *Cyber-kill chain strategies | ||
| − | + | '''Intended audience:''' Digital Forensic Analysts, IR Team Members, Penetration Testers, Exploit Developers, Red Team members <br> | |
| − | '''Intended audience:'''Digital Forensic Analysts, IR Team Members, Penetration Testers, Exploit Developers, Red Team members <br> | + | '''Skill level: ''' Prior minimum Cybersecurity experience. <br> |
| − | '''Skill level: '''Prior minimum Cybersecurity experience. <br> | + | '''Requirements:''' This course will contain a hands-on component, so attendees should bring their own laptop with at least 4 GB RAM, i5 processor, 40 GB available storage, virtualization software (VMware Workstation Player).<br> |
| − | '''Requirements:'''This course will contain a hands-on component, so attendees should bring their own laptop with at least 4 GB RAM, i5 processor, 40 GB available storage, virtualization software (VMware Workstation Player).<br> | ||
'''Seats available: '''20 (first-come, first served)<br> | '''Seats available: '''20 (first-come, first served)<br> | ||
'''Price: '''500 euros/person <br> | '''Price: '''500 euros/person <br> | ||
Revision as of 18:10, 31 July 2017
Training | |||||
| Time | Title | Trainers | Description | ||
| 1 day training 13th of October daily: 9:00 - 17:00 |
OWASP Top 10 vulnerabilities – discover, exploit, remediate |
Adrian Furtună – Founder & Ethical Hacker – VirtualStorm Security and Ionuţ Ambrosie – Security Consultant – KPMG Belgium |
Description: The overall objective of this workshop is to increase the participants’ awareness on the most common web application vulnerabilities and their associated risks. We will discuss each type of vulnerability described in the OWASP Top 10 project and will teach participants manual discovery and exploitation techniques. Furthermore, a set of useful security testing tools will be introduced during the workshop. This is a hands-on workshop where participants will learn how to:
Moreover, we will discuss ways in which security can be better integrated into the software development lifecycle and how the OWASP Top 10 vulnerabilities can be avoided, identified early on or mitigated before they reach production environments.
Seats available: 20 (first-come, first served) | ||
| 1 day training 13th of October daily: 9:00 - 17:00 |
Time critical DFIR: Key playbooks, techniques and tools for time-pressured investigations of security incidents |
Teodor Cimpoesu - Senior Manager Cyber Risk Advisory | Description: This course provides responders and threat hunting teams with advanced skills to hunt down, identify, counter, and recover from a wide range of threats within enterprise networks. Topics:
Intended audience: Digital Forensic Analysts, IR Team Members, Penetration Testers, Exploit Developers, Red Team members | ||