Difference between revisions of "OWASP AU Conference 2009 Training"

From OWASP
Jump to: navigation, search
(OWASP Australia 2008 Training Schedule - February 25th, 2008)
(OWASP Australia 2008 Training Schedule - February 25th, 2008)
Line 18: Line 18:
 
  | style="width:10%; background:#7B8ABD" | 10:45-11:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Morning Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
 
  | style="width:10%; background:#7B8ABD" | 10:45-11:00 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Morning Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
 
  |-
 
  |-
| style="width:10%; background:#7B8ABD" | 9:00-10:45 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock
+
| style="width:10%; background:#7B8ABD" | 11:00-12:30 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock
 
Session 2 Training
 
Session 2 Training
 
  | style="width:40%; background:#BCA57A" align="left" | Pravir Chandra
 
  | style="width:40%; background:#BCA57A" align="left" | Pravir Chandra
 
Session 2 Training  
 
Session 2 Training  
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 12:15-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Lunch, Vendor Technology Expo''
+
  | style="width:10%; background:#7B8ABD" | 12:30-13:30 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Lunch, Vendor Technology Expo''
|-
+
  |-
| style="width:10%; background:#7B8ABD" | 13:30-14:30 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock - ''The future (and past) of web application security how to detect and protect against value attacks''
+
| style="width:10%; background:#7B8ABD" | 13:30-13:30 || style="width:40%; background:#BC857A" align="left" | Andrew Vanderstock
  | style="width:40%; background:#BCA57A" align="left" | Siddharth Anbalahan - ''Advanced Techniques in Code Reviews''
+
Session 3 Training
|-
+
  | style="width:40%; background:#BCA57A" align="left" | Pravir Chandra
| style="width:10%; background:#7B8ABD" | 14:45-15:45 || style="width:40%; background:#BC857A" align="left" | Ranjita Shankar Iyer - ''A Prescriptive approach to Secure SDLC''
+
Session 3 Training
| style="width:40%; background:#BCA57A" align="left" | Brett Moore - ''Vulnerabilities In Action''
 
 
  |-
 
  |-
  | style="width:10%; background:#7B8ABD" | 15:45-16:15 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Afternoon Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
+
  | style="width:10%; background:#7B8ABD" | 15:30-15:45 || colspan="2" style="width:80%; background:#C2C2C2" align="left" | ''Afternoon Tea/Coffee, Vendor Technology Expo'' - ''Espresso Coffee (Sponsored by IBM) provided.''
 
  |-
 
  |-
 
  | style="width:10%; background:#7B8ABD" | 16:15-17:15 || style="width:40%; background:#BC857A" align="left" | Sumit Siddharth - ''Recent Advancements in SQL Injection Exploitation Techniques''
 
  | style="width:10%; background:#7B8ABD" | 16:15-17:15 || style="width:40%; background:#BC857A" align="left" | Sumit Siddharth - ''Recent Advancements in SQL Injection Exploitation Techniques''

Revision as of 09:53, 18 February 2009

OWASP Australia 2008 Training Schedule - February 25th, 2008

There are two training sessions held in seperate rooms at this year's conference. During the registration process select which training session you will join. Also all meals and a cocktail party are provided for everyone during the training day.

Day 1 - Wednesday Feb 25, 2009
Application Secure Architecture/Coding Course In-depth Assessment Techniques: Design, Code, and Runtime
08:00-09:00 Registration and Coffee - Espresso Coffee (Sponsored by IBM) provided.
9:00-10:45 Andrew Vanderstock

Session 1 Training

Pravir Chandra

Session 1 Training

10:45-11:00 Morning Tea/Coffee, Vendor Technology Expo - Espresso Coffee (Sponsored by IBM) provided.
11:00-12:30 Andrew Vanderstock

Session 2 Training

Pravir Chandra

Session 2 Training

12:30-13:30 Lunch, Vendor Technology Expo
13:30-13:30 Andrew Vanderstock

Session 3 Training

Pravir Chandra

Session 3 Training

15:30-15:45 Afternoon Tea/Coffee, Vendor Technology Expo - Espresso Coffee (Sponsored by IBM) provided.
16:15-17:15 Sumit Siddharth - Recent Advancements in SQL Injection Exploitation Techniques Karmendra Kohli - Wooden Swords and Plastic Guns - Insecure Security Defenses
17:15-18:00 Panel - Industry Experts, Talking about real Application Security Threats. (You ask the questions, in this informative 45 minutes of panel discussion on relevant industry issues.)
18:30-19:00 OWASP Social Gathering: Pre-Dinner Drinks & Cocktails

Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)

19:00-22:00 OWASP Social Gathering: Gala Dinner, Entertainment and Networking Opportunity. This is Free to all attendees and will be a great night.

Location: Conference Facility Foyer @ Gold Coast Convention Center (Level 1 FOYER)