This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

OWASP AppSec DC 2012/Training/Secure Web Application Development Training

Revision as of 20:27, 23 January 2012 by EoinKeary (talk | contribs) (Instructor)

Jump to: navigation, search


Registration Now OPEN! | Hotel | Schedule | Convention Center |


Course Length: 2 Day

Writing Secure code is the most effective method to securing your web applications. Writing secure code takes skill and know-how but results in a more stable and robust application and assists in protecting an organisations brand. Application security is not commonly a part of many computer science curricula today and most organizations have not focused on instituting a culture that includes application security as a core part of their software development training efforts.

This intensive 2-day course focuses on the most common web application security problems, including aspects of both the OWASP Top Ten (2010) and the MITRE Top 25. The course will introduce and demonstrate application assessment techniques, illustrating how application vulnerabilities can be exploited so students really understand how to avoid introducing such vulnerabilities in their code. Sudents get experience via doing, both in terms of exploitation but also the latest defences against common and advanced attacks covering both traditional and RIA applications.

Student Requirements

Laptop Required Students Need to Bring: Laptop capable of running apache tomcat, mysql etc Java jdk 1.6 installed. Network would be nice, but is not necessary. Local lab environment supplied on disk/USB for all students.


Audience: Technical, Developers Skill Level: Basic

1) Understand and identify the wide assortment of key web application risks.
2) Understand and be able to implement the coding techniques necessary to write low-risk, secure, web applications.
3) Lure developers into the Web Security Community in order to provide them with multiple expert sources for continued questions and research.


Jim Manico OWASP cheat sheet lead and VP of security architecture with Whitehat security.

Eoin Keary OWASP global board member, code review guide lead and director with

Gold Sponsors

Aspect logo owasp.jpg AppSecDC2009-Sponsor-securicon.gif AppSecDC2009-Sponsor-mandiant.gif AppSecDC2012-ISC2.gif

Silver Sponsors


Small Business

AppSecDC2012-Sponsor-sideas.gif BayShoreNetworks.png


link= Codenomicon WhiteHat Logo.png AppSecDC2012-HP.jpg WSI - Logo.jpg