Difference between revisions of "OWASP AppSec DC 2009 Training Schedule"

From OWASP
Jump to: navigation, search
(Created page with '===Back to Conference Page=== Please note, speaking times are not final, check back regularly for updates. {| cellspacing="0" border="2" |- valign="midd…')
 
 
(One intermediate revision by one user not shown)
Line 4: Line 4:
 
{| cellspacing="0" border="2"
 
{| cellspacing="0" border="2"
 
|- valign="middle"
 
|- valign="middle"
| height="60" align="center" colspan="6" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 1 - Nov 11th 1509'''</font>
+
| height="60" align="center" colspan="6" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 1 - Nov 10th 1509'''</font>
 
|- valign="bottom"
 
|- valign="bottom"
 
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | &nbsp;  
 
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | &nbsp;  
Line 11: Line 11:
 
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Room 3'''  
 
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Room 3'''  
 
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 4'''
 
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 4'''
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 5'''
+
| width="150" valign="middle" height="40" bgcolor="#BCA57A" align="center" | '''Room 5'''
 
|- valign="bottom"
 
|- valign="bottom"
 
| width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00  
 
| width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00  
Line 18: Line 18:
 
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja
 
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja
 
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Web 2.0 Security - SOA, Web Services, and XML
 
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Web 2.0 Security - SOA, Web Services, and XML
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Secure Coding for .Net<br>Whitehat
+
| width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Secure Coding for .Net<br>Whitehat
 
|- valign="bottom"
 
|- valign="bottom"
 
| width="67" valign="middle" height="60" bgcolor="#7b8abd" | 12:00-13:00  
 
| width="67" valign="middle" height="60" bgcolor="#7b8abd" | 12:00-13:00  
Line 28: Line 28:
 
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja
 
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | Threat Modeling Express<br>Krishna Raja
 
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Web 2.0 Security - SOA, Web Services, and XML
 
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Web 2.0 Security - SOA, Web Services, and XML
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Secure Coding for .Net<br>Whitehat <!-- Day 2 -->
+
| width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Secure Coding for .Net<br>Whitehat <!-- Day 2 -->
 
|- valign="middle"
 
|- valign="middle"
 
| height="60" colspan="6" |  
 
| height="60" colspan="6" |  
 
|- valign="middle"
 
|- valign="middle"
| height="60" align="center" colspan="6" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 2 - Nov 12th 1509'''</font>
+
| height="60" align="center" colspan="6" style="background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;" | <font size="5">'''Day 2 - Nov 11th 1509'''</font>
 
|- valign="bottom"
 
|- valign="bottom"
 
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | &nbsp;  
 
| width="67" valign="middle" height="40" bgcolor="#7b8abd" | &nbsp;  
Line 39: Line 39:
 
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Room 3'''  
 
| width="150" valign="middle" height="40" bgcolor="#a0c0e0" align="center" | '''Room 3'''  
 
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 4'''
 
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 4'''
| width="150" valign="middle" height="40" bgcolor="#b3ff99" align="center" | '''Room 5'''
+
| width="150" valign="middle" height="40" bgcolor="#BCA57A" align="center" | '''Room 5'''
 
|- valign="bottom"
 
|- valign="bottom"
 
| width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00  
 
| width="67" valign="middle" bgcolor="#7b8abd" | 09:00-12:00  
Line 46: Line 46:
 
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | WebAppSec.php: Developing Secure Web Applications<br>Robert Zakon
 
| width="150" valign="middle" height="120" bgcolor="#a0c0e0" align="center" | WebAppSec.php: Developing Secure Web Applications<br>Robert Zakon
 
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Applying the OWASP Testing Guide with the OWASP Live CD<br>Matt Tesauro
 
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Applying the OWASP Testing Guide with the OWASP Live CD<br>Matt Tesauro
| width="150" valign="middle" height="120" bgcolor="#b3ff99" align="center" | Leader and Manager Training - Leading the Development of Secure Applications<br>Dave Wichers
+
| width="150" valign="middle" height="120" bgcolor="#BCA57A" align="center" | Leader and Manager Training - Leading the Development of Secure Applications<br>Dave Wichers
 
|- valign="bottom"
 
|- valign="bottom"
 
| width="67" valign="middle" height="60" bgcolor="#7b8abd" | 12:00-13:00  
 
| width="67" valign="middle" height="60" bgcolor="#7b8abd" | 12:00-13:00  

Latest revision as of 12:11, 29 September 2009

Back to Conference Page

Please note, speaking times are not final, check back regularly for updates.

Day 1 - Nov 10th 1509
  Room 1 Room 2 Room 3 Room 4 Room 5
09:00-12:00 Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework
Justin Searle
Java EE Secure Code Review
Sahba Kazerooni
Threat Modeling Express
Krishna Raja
Web 2.0 Security - SOA, Web Services, and XML Secure Coding for .Net
Whitehat
12:00-13:00 Lunch
13:00-17:00 Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework
Justin Searle
Java EE Secure Code Review
Sahba Kazerooni
Threat Modeling Express
Krishna Raja
Web 2.0 Security - SOA, Web Services, and XML Secure Coding for .Net
Whitehat
Day 2 - Nov 11th 1509
  Room 1 Room 2 Room 3 Room 4 Room 5
09:00-12:00 Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework
Justin Searle
Java EE Secure Code Review
Sahba Kazerooni
WebAppSec.php: Developing Secure Web Applications
Robert Zakon
Applying the OWASP Testing Guide with the OWASP Live CD
Matt Tesauro
Leader and Manager Training - Leading the Development of Secure Applications
Dave Wichers
12:00-13:00 Lunch
13:00-17:00 Assessing and Exploiting Web Applications with the open source Samurai Web Testing Framework
Justin Searle
Java EE Secure Code Review
Sahba Kazerooni
WebAppSec.php: Developing Secure Web Applications
Robert Zakon
Applying the OWASP Testing Guide with the OWASP Live CD
Matt Tesauro
Leader and Manager Training - Leading the Development of Secure Applications
Dave Wichers