This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

OWASP Bucharest AppSec Conference 2017 Training2

From OWASP
Revision as of 18:04, 31 July 2017 by Oana Cornea (talk | contribs) (edit1)

Jump to: navigation, search

Training

Time Title Trainers Description
2 days training
11th, 12th of October
daily: 9:00 - 17:00

Droid-Sec Exploitation
Thomas Blessen Description:
The Droid-Sec Exploitation training will enable attendees to master various android application penetration testing techniques and exploitation methods.

The training focuses on practical hands-on exercises on several dedicated vulnerable apps, with the basic theory explained prior to the Do-ItYourself mind-bending exercises, enabling the attendee to test his acquired skills during the training.
This two-day fast paced brain-melting revamped flag-ship training program will include subjects covered from setting up Android pentest environment, Identifying and exploiting application vulnerabilities in a variety of mobile application architectures, relevant mobile forensics ,malware analysis concepts, and complementary subjects.
Intended audience:

  • Android Developers
  • Information Security Professionals
  • Mobile Application Vulnerability Analyst /Auditors
  • Mobility, Mobile Security & Operations Team
  • Pen testers and Security professionals interested to get into Android Security

Skill level: Basic - Intermediate
Requirements:

  • Students could be familiar with below topics but not mandatory
  • Skill level required is basic
  • Common security concepts or common web security issues
  • Basic knowledge of the Linux OS and network security basics


Seats available: 20 (first-come, first served)
Price: 800 euros/person
Register here

2 days training
11th, 12th of October
daily: 9:00 - 17:00

HackLab: Introduction to Cryptography
Rolf Pielage Description:

Day 1

  • Introduction to cryptography & terminology
  • Cryptanalysis
  • Basic Cryptography: Caesar, Vigenère, Enigma, One-time-pad, Kerckhoff’s Principle
  • Symmetric Cryptography

Stream ciphers: LFSR, RC4
Block ciphers: DES, AES
Day 2

  • Recap & Asymmetric Cryptography: Diffie-Hellman, ElGamal, RSA, DSA, Elliptic Curve
  • Diffie-Hellman, ElGamal, RSA, DSA, Elliptic Curve
  • One-way functions

Intended audience:Security managers; Risk managers; IT security professionals; IT auditors; Security officers
Skill level: Basic - Intermediate
Requirements:There are no special pre-requisites for this course. The attendees should bring their own laptop with at least 4GB RAM, i5 processor, 40GB storage space, virtualization software (VMware Workstation Player).
Seats available: 20 (first-come, first served)
Price: 1000 euros/person
Register here