This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP AppSec Conference Training"
m (→T6. TBD) |
m (→OWASP AppSec 2008 Training Courses - October 9-10, 2008) |
||
Line 9: | Line 9: | ||
{| align="center" width="60%" cellpadding="2" cellspacing="5" style="vertical-align:top;background-color:#cedff2" | {| align="center" width="60%" cellpadding="2" cellspacing="5" style="vertical-align:top;background-color:#cedff2" | ||
! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">T1</div> | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">T1</div> | ||
− | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;"> | + | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">Defensive Programming</div> |
|- | |- | ||
! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">T2</div> | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">T2</div> | ||
− | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">Application Security | + | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">Advanced Web Application Security Testing</div> |
|- | |- | ||
! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">T3</div> | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">T3</div> | ||
− | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;"> | + | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">Web Services and XML Security</div> |
|- | |- | ||
! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">T4</div> | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">T4</div> | ||
− | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;"> | + | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">Leading the Development of Secure Applications</div> |
|- | |- | ||
! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">T5</div> | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">T5</div> | ||
− | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;"> | + | ! <div style="margin:0;background-color:#f5faff;font-family:sans-serif;font-size:100%;font-weight:bold;border:1px solid #a3b0bf;text-align:left;color:#000;padding:0.2em 0.4em;">Application Security Forensics</div> |
− | + | ||
− | |||
− | |||
|} | |} | ||
Revision as of 15:11, 29 February 2008
- 1 OWASP AppSec 2008 Training Courses - October 9-10, 2008
- 2 T1. Defensive Programming - 2-Day Course - Oct 9-10, 2008
- 3 T2. Advanced Web Application Security Testing - 1-Day Course - Oct xx, 2008
- 4 T3. Web Services and XML Security
- 5 T4. Leading the Development of Secure Applications - 1-Day Course - Oct 9, 2008
- 6 T5. Application Security Forensics- 1-Day Course - Oct 10, 2008
OWASP AppSec 2008 Training Courses - October 9-10, 2008
OWASP has arranged to have xx 2-day and xx 1-day Application Security training courses following the conference.
Three courses will be provided by a long time contributor to OWASP, Aspect Security. One course will be provided by a Pravir Chandra, Project lead of the OWASP Clasp Project. Another course will be presented by the FBI.
These courses are being offered to attendees of the OWASP conference at a significant discount to their standard commercial price. Most of the course fee will go to OWASP to support the OWASP Foundation's efforts.
T1
|
Defensive Programming
|
---|---|
T2
|
Advanced Web Application Security Testing
|
T3
|
Web Services and XML Security
|
T4
|
Leading the Development of Secure Applications
|
T5
|
Application Security Forensics
|
Pricing
$675 for 1-Day Training Course
$1350 for 2-Day Training course
Location
At Pace University in New York. Same location as the conference.
Course Times
Each class begins at xx AM and runs until xx PM each day.
Registration
Registration is available via the OWASP Conference Cvent site at:
T1. Defensive Programming - 2-Day Course - Oct 9-10, 2008
Course Overview
This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws.
Details
Day One
Understanding the platform,
Language design considerations,
Memory management features,
Browser security model,
Handling Input and Output Securely,
Interfacing with a database,
Understanding the control and data planes,
Handling user input,
Character representation and encoding,
Determinism and Concurrency,
Acting on resource properties,
Reliable locking schemes,
Shared system resources,
Session Management,
Random numbers and temporary files,
Day Two:
Safe Error Handling and Logging,
Error/exception handling,
Numeric data types,
Programmatic checks and assertions,
Audit Logging,
Debug Code,
Information Leakage,
Engineering for Security Features,
Applying cryptography,
Authentication and authorization,
Managing application state,
Secrets inside code,
Using privileged code,
Designing hardened interfaces,
Software Security in Operations,
Network Infrastructure,
Configuration of web apps,
Application Packaging,
Code Signing,
Managing Key Material,
Reference
Registration
Registration is available via the OWASP Conference Cvent site at:
Tutorial Provider
This tutorial is provided by Pravir Chandra, a well known security expert, project lead for OWASP CLASP project and former co-founder & CTO of secure software
T2. Advanced Web Application Security Testing - 1-Day Course - Oct xx, 2008
Course Overview
Registration
Registration is available via the OWASP Conference Cvent site at:
Tutorial Provider
This tutorial is provided by longtime OWASP contributor:
T3. Web Services and XML Security
Course Overview
Details
Registration
Registration is available via the OWASP Conference Cvent site at:
Tutorial Provider
T4. Leading the Development of Secure Applications - 1-Day Course - Oct 9, 2008
Course Overview
Registration
Registration is available via the OWASP Conference Cvent site at:
Tutorial Provider
This tutorial is provided by longtime OWASP contributor:
T5. Application Security Forensics- 1-Day Course - Oct 10, 2008
Course Overview
How would you respond to a application security hack? This course will provide insight into the world or forensics with a focus on Web Application Security
Registration
Registration is available via the OWASP Conference Cvent site at:
Tutorial Provider
This category currently contains no pages or media.