This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AppSec DC 2009 Training Schedule"
From OWASP
Mark.bristow (talk | contribs) |
Mark.bristow (talk | contribs) |
||
| Line 11: | Line 11: | ||
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Room 3''' | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Room 3''' | ||
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 4''' | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 4''' | ||
| − | | width="150" valign="middle" height="40" bgcolor="# | + | | width="150" valign="middle" height="40" bgcolor="#BCA57A" align="center" | '''Room 5''' |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00 | | width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00 | ||
| Line 18: | Line 18: | ||
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja | | width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja | ||
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Web 2.0 Security - SOA, Web Services, and XML | | width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Web 2.0 Security - SOA, Web Services, and XML | ||
| − | | width="150" valign="middle" height="120" bgcolor="# | + | | width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Secure Coding for .Net<br>Whitehat |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="60" bgcolor="#7b8abd" | 12:00-13:00 | | width="67" valign="middle" height="60" bgcolor="#7b8abd" | 12:00-13:00 | ||
| Line 28: | Line 28: | ||
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja | | width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja | ||
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Web 2.0 Security - SOA, Web Services, and XML | | width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Web 2.0 Security - SOA, Web Services, and XML | ||
| − | | width="150" valign="middle" height="120" bgcolor="# | + | | width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Secure Coding for .Net<br>Whitehat <!-- Day 2 --> |
|- valign="middle" | |- valign="middle" | ||
| height="60" colspan="6" | | | height="60" colspan="6" | | ||
| Line 39: | Line 39: | ||
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Room 3''' | | width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Room 3''' | ||
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 4''' | | width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 4''' | ||
| − | | width="150" valign="middle" height="40" bgcolor="# | + | | width="150" valign="middle" height="40" bgcolor="#BCA57A" align="center" | '''Room 5''' |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00 | | width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00 | ||
| Line 46: | Line 46: | ||
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | WebAppSec.php: Developing Secure Web Applications<br>Robert Zakon | | width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | WebAppSec.php: Developing Secure Web Applications<br>Robert Zakon | ||
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Applying the OWASP Testing Guide with the OWASP Live CD<br>Matt Tesauro | | width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Applying the OWASP Testing Guide with the OWASP Live CD<br>Matt Tesauro | ||
| − | | width="150" valign="middle" height="120" bgcolor="# | + | | width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Leader and Manager Training - Leading the Development of Secure Applications<br>Dave Wichers |
|- valign="bottom" | |- valign="bottom" | ||
| width="67" valign="middle" height="60" bgcolor="#7b8abd" | 12:00-13:00 | | width="67" valign="middle" height="60" bgcolor="#7b8abd" | 12:00-13:00 | ||
Latest revision as of 17:11, 29 September 2009
Back to Conference Page
Please note, speaking times are not final, check back regularly for updates.
| Day 1 - Nov 10th 1509 | |||||
| Room 1 | Room 2 | Room 3 | Room 4 | Room 5 | |
| 09:00-12:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni |
Threat Modeling Express Krishna Raja |
Web 2.0 Security - SOA, Web Services, and XML | Secure Coding for .Net Whitehat |
| 12:00-13:00 | Lunch | ||||
| 13:00-17:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni |
Threat Modeling Express Krishna Raja |
Web 2.0 Security - SOA, Web Services, and XML | Secure Coding for .Net Whitehat |
| Day 2 - Nov 11th 1509 | |||||
| Room 1 | Room 2 | Room 3 | Room 4 | Room 5 | |
| 09:00-12:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni |
WebAppSec.php: Developing Secure Web Applications Robert Zakon |
Applying the OWASP Testing Guide with the OWASP Live CD Matt Tesauro |
Leader and Manager Training - Leading the Development of Secure Applications Dave Wichers |
| 12:00-13:00 | Lunch | ||||
| 13:00-17:00 | Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework Justin Searle |
Java EE Secure Code Review Sahba Kazerooni |
WebAppSec.php: Developing Secure Web Applications Robert Zakon |
Applying the OWASP Testing Guide with the OWASP Live CD Matt Tesauro |
Leader and Manager Training - Leading the Development of Secure Applications Dave Wichers |