Shakacon V Trainings

Shakacon V Trainings
Event on 2013-06-25 08:00:00

Training 1: Building Secure Web Applications, Webservices and Mobile Applications, Jim Manico – June 25-26, 2013

Description: The major cause of web insecurity is poor development practices. This highly intensive 2-day course provides essential application security training for web application, webservice and mobile software developers and architects. The class is a combination of lecture, hands-on security testing and code review. Participants will not only learn the most common threats against applications, but more importantly they will learn how to also fix the problems and design secure web solutions via defense-based code samples and review. We provide free email support for life for all students. Digital copies of all course ware will be provided.

Biography: Jim Manico is the VP of Security Architecture for WhiteHat Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.

Training 2: Being an Advanced Persistent Threat: How to Compromise and Persist on Any Network, Colin Ames & Chris Potter – June 25-26, 2013

Description: With this course you will learn how to leverage the latest offensive techniques and capabilities to compromise and persist on any network with a 100% success rate.  Students will walk away with the skills and tools needed to compromise any system regardless of skill set.  During this course we will discuss the tactical exploitation methodology.  This methodology includes targeting systems and users, profiling the selected targets, properly weaponizing exploits and payloads, proper exfiltration and miss-attribution techniques and how to get away with all of it.  All of these techniques are taught with hands on, real world, and lab based exercises.  Each student will receive a TEENSY USB device for the final exercise of the course as well as copies of all slides, tools, and relevant source code material.  Prizes will also be given out for successful exercises.  

Biographies: Colin Ames is a founding Partner and Security Researcher with Attack Research where he consults for both the private and public sectors. He's currently focused on Pen testing, Exploit Development, Reverse Engineering, and Malware Analysis.

Chris Potter is a Security Consultant and Researcher with Secure DNA. Chris specializes in web based application development security. He has collaborated with some of the top security researchers and companies in the world and has performed static and dynamic security assessments for numerous companies and government agencies across the U.S. and Asia.

at Neal S. Blaisdell Center
777 Ward Avenue
Honolulu, United States

This entry was posted in Yahoo! Video and tagged , . Bookmark the permalink.

Leave a Reply