Difference between revisions of "NYC"

From OWASP
Jump to: navigation, search
(OWASP NYC)
 
(17 intermediate revisions by 3 users not shown)
Line 1: Line 1:
= OWASP NYC =
+
{{Chapter Template|chaptername=New York City|extra=The chapter leader is [mailto:tomb@owasp.org Tom Brennan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-new-york|emailarchives=http://lists.owasp.org/pipermail/owasp-new-york}}
This local chapter uses a community building website known as MeetUp, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you view it on your smart phone or via your personal computer.
+
  
<h2>[http://www.meetup.com/OWASPNYCMETRO https://www.owasp.org/images/8/82/Meetup_logo3.jpg] [http://www.meetup.com/OWASPNYCMETRO New York City Chapter] - [http://www.meetup.com/OWASPNYCMETRO Click Here More Info]</h2>
+
== Local News ==
  
<hr>
+
The New York City OWASP Chapter uses a community building website known as Meet-Up, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you come to one of our meetings and ask about how to use a proxy.
<h2>OWASP New York City Chapter Training </h2>
+
  
<h2>Software Security Training </h2>
+
<h2>[http://www.meetup.com/OWASPNYCMETRO https://www.owasp.org/images/8/82/Meetup_logo3.jpg] [http://www.meetup.com/OWASPNYCMETRO New York City Chapter] - [http://www.meetup.com/OWASPNYCMETRO Click Here More Info] </h2>
  
When:
+
<br>
Wednesday, March 13, 2013 - Thursday, March 14, 2013
+
9:00 AM - 5:00 PM
+
Eastern Time Zone
+
 
+
Where:
+
Hotel Pennsylvania
+
401 7th Avenue
+
Between 32nd and 33rd Streets
+
New York, New York 10001
+
  
 
+
Are you looking for [https://www.owasp.org/index.php/NYC/training/may2015 ISC2 CSSLP Training in New York City?] simply [https://www.owasp.org/index.php/NYC/training/may2015 CLICK HERE]
<h3> Application Cryptanalysis Made Easy (1 Day Training)</h3>
+
 
+
Use of cryptography permeates today's computing infrastructures.  While few programmers attempt to implement sophisticated cryptosystems, many unwittingly develop simple protocols in every day applications without adequate knowledge of how cryptographic primitives should be combined. In this training we explore several techniques for analyzing and breaking the kinds of cryptographic protocols which are commonly found in modern applications.
+
 
+
Attendees will first be presented with a brief review of cryptographic primitives and their uses, followed by an introduction of several techniques to analyze cryptographic systems in a black-box manner.  In each case, the discussion will describe how programmers can avoid making the common mistakes that allow these attacks to succeed.
+
 
+
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited!
+
 
+
Course syllabus: [https://www.owasp.org/images/2/22/VSR_Training_-_Application_Cryptanalysis_Made_Easy.pdf Application Cryptanalysis Made Easy]
+
 
+
<h3> Hack Your Own Code: Advanced Training for Developers (2 Day Training Course)</h3>
+
 
+
This class provides developers an exciting chance to hone their programming skills while also learning to exploit common web vulnerabilities. Unlike most training, this will not use static demos based on pre-canned source code. Students will program small parts of a larger application during the class’s lab periods. After the component has been written, students will review the code for the vulnerability being focused on in the lab. Vulnerable code will be run on a class-accessible server while the instructor guides students through exploiting the vulnerabilities. After the vulnerability is exploited, students will be shown how their own code can be fixed (if it was vulnerable) and the best way to prevent the flaw in the first place.
+
 
+
This full process will be performed for all major code vulnerabilities in the OWASP Top Ten. Exploitation and patching labs (but not programming) will be held for other vulnerabilities, including logic flaws that are hard to represent on the Top Ten. Several labs will feature prizes for the students that first find or exploit the targeted vulnerability. Environments and examples will be setup for all major platforms requested by pre-registered students. Students should bring a laptop with them, preferably with VMWare Player already installed. A virtual machine based on the OWASP Live Boot CD will be provided for lab work. The virtual machine will include development tools, but students should feel free to bring their favorite programs too.
+
 
+
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited!
+
 
+
Course syllabus: [https://www.owasp.org/images/a/ac/Training_-_Hack_your_own_code.pdf Hack Your Own Code]
+
 
+
<h3> Securing Mobile Devices and Applications (2 Day Training Course)</h3>
+
 
+
Mobile applications enable new threats and attacks which introduce significant risks to the enterprise, and many custom applications contain significant vulnerabilities that are unknown to the team that developed them. Considering the number of mobile applications available in the Google Play and Apple AppStore is nearing 1.5 million and vulnerabilities are skyrocketing it is imperative to perform typical application security practices. But, how is mobile different?
+
 
+
This two-day, hands-on course enables students to understand how easily mobile devices and applications can be successfully attacked. They will learn how to identify, avoid and remediate common vulnerabilities by walking through a threat analysis and learning critical security areas such as those identified in the OWASP Top Ten Mobile Risks and Controls. Using state-of-the-art testing tools, students will learn how to secure mobile devices across the enterprise. Students will be able to choose from iOS or Android hands-on labs throughout the course, while they learn how easily the bad guy can compromise applications and the data they contain.
+
 
+
Register Online to Secure Your Seat http://www.cvent.com/d/3cq429 Space is Limited!
+
 
+
Course syllabus: [https://www.owasp.org/images/8/8e/Aspect_Security_Training_-_Mobile_Security.pdf Securing Mobile Devices and Applications]
+
 
+
 
+
<h2>Pricing: </h2>
+
 
+
1 Day Course: $750 / 2 Day Course: $1,500
+
 
+
 
+
<hr>
+
Additional question?
+
 
+
Contact:
+
Jasmine@owasp.org at 862-397-0111
+
 
+
<hr>
+
  
 
[[Category:OWASP Chapter]]
 
[[Category:OWASP Chapter]]
 +
[[Category:United States]]
 
[[Category:New York]]
 
[[Category:New York]]

Latest revision as of 14:00, 8 July 2015

OWASP New York City

Welcome to the New York City chapter homepage. The chapter leader is Tom Brennan.
Click here to join the local chapter mailing list.

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter.

Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG

Local News

The New York City OWASP Chapter uses a community building website known as Meet-Up, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you come to one of our meetings and ask about how to use a proxy.

Meetup_logo3.jpg New York City Chapter - Click Here More Info


Are you looking for ISC2 CSSLP Training in New York City? simply CLICK HERE