Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
View analytic

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Training [clear filter]
Tuesday, October 1
 

9:00am

Training: How To Secure The SDLC
The course aims to teach the various aspects required to design a hacking resilient software product. After showing which best practices activities around a SDLC must be incorporate, the course will dive deeper on the concepts, processes and techniques behind them; best known as the Common Base Knowledge. At end of the course, the comprehensive knowledge will equip you to re-start your SDLC in a “secure way”, or at least to quickly improve your current practices, whatever your role is in your software development team.

Speakers
JR

Javier Romero

CTO, JaCkSecurity
Javier Romero is the Chief Technology Officer of JaCkSecurity. He works in the security field since October 1999. His jobs since those years has spanned from analyst, officer and chief, to manage risk, secure networks and response incidents. | | Specialties:In the present, his job focus on information security consulting and out-tasking, with ISMS, BCM, IR, pentesting and network security monitoring, as operational team leader. Currently holds... Read More →


Tuesday October 1, 2013 9:00am - 5:00pm
Computer Lab 3 Escuela de Postgrado UTP Salaverry 2443, Lima, Peru

9:00am

Training: Scripting for Penetration Testers
The work of a true pentester is not limited to the use of tools developed by third parties becasue these tools do not completely cover the requirements for real penetration testing.
This training enables a working knowledge of the application of different scripting languages ​​in penetration, both to automate some processes and to get success where automated tools and / or specialized ones don't get the expected results.
It will cover script development at operating system level (MS Windows and Linux), use of the scripting options in popular hacking tools (NMAP, Nessus, Metasploit) to extend or improve their results and script development to exploit MS Windows and web application vulnerabilities.

Speakers
avatar for Walter Cuestas

Walter Cuestas

CEO and Co-Founder, Open-Sec
Walter Cuestas is the current CEO and co-founder of Open-Sec, a Peruvian company dedicated to developing ethical hacking services, computer forensics and analysis of computer security incidents. I'm the technical leader of the team of ethical hackers at Open-Sec carrying out processes of vulnerability analysis and penetration testing. My daily work is about defining attack strategies and my main interest is about developing scripts for... Read More →


Tuesday October 1, 2013 9:00am - 5:00pm
Computer Lab 2 Escuela de Postgrado UTP Salaverry 2443, Lima, Peru
 
Wednesday, October 2
 

9:00am

Training: How To Secure The SDLC
The course aims to teach the various aspects required to design a hacking resilient software product. After showing which best practices activities around a SDLC must be incorporate, the course will dive deeper on the concepts, processes and techniques behind them; best known as the Common Base Knowledge. At end of the course, the comprehensive knowledge will equip you to re-start your SDLC in a “secure way”, or at least to quickly improve your current practices, whatever your role is in your software development team.

Speakers
JR

Javier Romero

CTO, JaCkSecurity
Javier Romero is the Chief Technology Officer of JaCkSecurity. He works in the security field since October 1999. His jobs since those years has spanned from analyst, officer and chief, to manage risk, secure networks and response incidents. | | Specialties:In the present, his job focus on information security consulting and out-tasking, with ISMS, BCM, IR, pentesting and network security monitoring, as operational team leader. Currently holds... Read More →


Wednesday October 2, 2013 9:00am - 5:00pm
Computer Lab 3 Escuela de Postgrado UTP Salaverry 2443, Lima, Peru

9:00am

Training: Scripting for Penetration Testers
The work of a true pentester is not limited to the use of tools developed by third parties becasue these tools do not completely cover the requirements for real penetration testing.
This training enables a working knowledge of the application of different scripting languages ​​in penetration, both to automate some processes and to get success where automated tools and / or specialized ones don't get the expected results.
It will cover script development at operating system level (MS Windows and Linux), use of the scripting options in popular hacking tools (NMAP, Nessus, Metasploit) to extend or improve their results and script development to exploit MS Windows and web application vulnerabilities.

Speakers
avatar for Walter Cuestas

Walter Cuestas

CEO and Co-Founder, Open-Sec
Walter Cuestas is the current CEO and co-founder of Open-Sec, a Peruvian company dedicated to developing ethical hacking services, computer forensics and analysis of computer security incidents. I'm the technical leader of the team of ethical hackers at Open-Sec carrying out processes of vulnerability analysis and penetration testing. My daily work is about defining attack strategies and my main interest is about developing scripts for... Read More →


Wednesday October 2, 2013 9:00am - 5:00pm
Computer Lab 2 Escuela de Postgrado UTP Salaverry 2443, Lima, Peru