This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Bucharest AppSec Conference 2018 Training2"
m (Fix typos for the Advanced Web Hacking and Secure Coding) (Tag: Visual edit) |
Oana Cornea (talk | contribs) |
||
| Line 6: | Line 6: | ||
| colspan="0" style="width:25%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" | '''Trainers''' | | colspan="0" style="width:25%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" | '''Trainers''' | ||
| colspan="0" style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" | '''Description''' | | colspan="0" style="width:40%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" | '''Description''' | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
|- | |- | ||
| colspan="0" style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" | 2 days training <br> 24th and 25th of October <br> daily: 9:00 - 17:00<br><br> | | colspan="0" style="width:10%" valign="middle" height="30" bgcolor="#CCEEEE" align="center" | 2 days training <br> 24th and 25th of October <br> daily: 9:00 - 17:00<br><br> | ||
Latest revision as of 09:00, 16 October 2018
Training | |||||
| Time | Title | Trainers | Description | ||
| 2 days training 24th and 25th of October daily: 9:00 - 17:00 |
Advanced Web Hacking and Secure Coding | Vikram Salunke | Description: Web applications are becoming more complex and targets are become more hardened to penetrate. Nowadays Load Balancers, Web Application Firewalls (WAF) are very common in infrastructure. So, as a pentester, we should improve our skills to defeat modern access controls mechanisms. This hands-on training covers both offensive and defensive approaches to web applications. You’ll learn how to identify vulnerabilities of web applications, how to execute exploit against that vulnerability, how the attacks works, and how to prevent them in the future. This training closes that gap between web application attack and defense. Because as they say - if you want to stop attacker from stealing you data then you must think like one.
Day 2:
Intended audience: software developers, security people with some programming experience
Seats available: 20 (first-come, first served) | ||