This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

New Jersey

From OWASP
Revision as of 13:09, 13 February 2013 by Brennan (talk | contribs)

Jump to: navigation, search

OWASP New Jersey

Meetup_logo3.jpg New Jersey Chapter Click Here More Info



Software Security Training

When: Wednesday, March 13, 2013 - Thursday, March 14, 2013 9:00 AM - 5:00 PM Eastern Time Zone


Where: Hotel Pennsylvania 401 7th Avenue Between 32nd and 33rd Streets New York, New York 10001


Application Cryptanalysis Made Easy (1 Day Training)

Use of cryptography permeates today's computing infrastructures. While few programmers attempt to implement sophisticated cryptosystems, many unwittingly develop simple protocols in every day applications without adequate knowledge of how cryptographic primitives should be combined. In this training we explore several techniques for analyzing and breaking the kinds of cryptographic protocols which are commonly found in modern applications.

Attendees will first be presented with a brief review of cryptographic primitives and their uses, followed by an introduction of several techniques to analyze cryptographic systems in a black-box manner. In each case, the discussion will describe how programmers can avoid making the common mistakes that allow these attacks to succeed.

Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! Course syllabus: https://docs.google.com/folder/d/0B-IjCXl19haHSFR6NXJTdk5uTE0/edit

Hack Your Own Code: Advanced Training for Developers (2 Day Training Course)

This class provides developers an exciting chance to hone their programming skills while also learning to exploit common web vulnerabilities. Unlike most training, this will not use static demos based on pre-canned source code. Students will program small parts of a larger application during the class’s lab periods. After the component has been written, students will review the code for the vulnerability being focused on in the lab. Vulnerable code will be run on a class-accessible server while the instructor guides students through exploiting the vulnerabilities. After the vulnerability is exploited, students will be shown how their own code can be fixed (if it was vulnerable) and the best way to prevent the flaw in the first place.

This full process will be performed for all major code vulnerabilities in the OWASP Top Ten. Exploitation and patching labs (but not programming) will be held for other vulnerabilities, including logic flaws that are hard to represent on the Top Ten. Several labs will feature prizes for the students that first find or exploit the targeted vulnerability. Environments and examples will be setup for all major platforms requested by pre-registered students. Students should bring a laptop with them, preferably with VMWare Player already installed. A virtual machine based on the OWASP Live Boot CD will be provided for lab work. The virtual machine will include development tools, but students should feel free to bring their favorite programs too.

Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! Course syllabus: https://docs.google.com/folder/d/0B-IjCXl19haHSFR6NXJTdk5uTE0/edit

Securing Mobile Devices and Applications (2 Day Training Course)

Mobile applications enable new threats and attacks which introduce significant risks to the enterprise, and many custom applications contain significant vulnerabilities that are unknown to the team that developed them. Considering the number of mobile applications available in the Google Play and Apple AppStore is nearing 1.5 million and vulnerabilities are skyrocketing it is imperative to perform typical application security practices. But, how is mobile different?

This two-day, hands-on course enables students to understand how easily mobile devices and applications can be successfully attacked. They will learn how to identify, avoid and remediate common vulnerabilities by walking through a threat analysis and learning critical security areas such as those identified in the OWASP Top Ten Mobile Risks and Controls. Using state-of-the-art testing tools, students will learn how to secure mobile devices across the enterprise. Students will be able to choose from iOS or Android hands-on labs throughout the course, while they learn how easily the bad guy can compromise applications and the data they contain.

Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited! Course syllabus: https://docs.google.com/folder/d/0B-IjCXl19haHSFR6NXJTdk5uTE0/edit

Pricing:

1 Day Course: $750 / 2 Day Course: $1,500


Who are the active chapter members that are helping to build a robust chapter in 2012?

NJ = http://www.meetup.com/OWASP-New-Jersey/members/?op=leaders