WebApp Sec mailing list archives

ModSecurity Training at the upcoming WASC/OWASP AppSec 2007 Conference


From: "Ryan Barnett" <rcbarnett () gmail com>
Date: Mon, 29 Oct 2007 14:10:39 -0400

Finally there is a public ModSecurity course you can attend!

As part of the upcoming OWASP/WASC AppSec 2007 conference in San Jose,
I am giving a two day ModSecurity Boot-Camp Training course on Nov
12th and 13th. As an additional bonus, Ivan Ristic, The creator of
ModSecurity will also be in attendance for portions of the class. So,
if you ever wanted a chance to learn more about ModSecurity and to
pick the brain's of the ModSecurity experts, this is your chance :)

In the true nature of open source, most of the proceedings from the
course goes to OWASP, the Open Web Application Security project, for
open source projects and activities promoting web application
security.  For more details, a complete program and registration go
to:
https://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training007/Traininghttps://www.owasp.org/index.php/7th_OWASP_AppSec_Conference_-_San_Jose_2007/Training007/Training

Hope to see you there :)

-- 
Ryan C. Barnett
ModSecurity Community Manager
Breach Security: Director of Application Security Training
Web Application Security Consortium (WASC) Member
CIS Apache Benchmark Project Lead
SANS Instructor, GCIA, GCFA, GCIH, GSNA, GCUX, GSEC
Author: Preventing Web Attacks with Apache

-------------------------------------------------------------------------
Sponsored by: Watchfire

Cross-Site Scripting (XSS) is one of the most common application-level 
attacks that hackers use to sneak into web applications today. This 
whitepaper will discuss how traditional XSS attacks are performed, how to 
secure your site against these attacks and check if your site is protected. 
Cross-Site Scripting Explained - Download this whitepaper today! 

https://www.watchfire.com/securearea/whitepapers.aspx?id=701700000009405
-------------------------------------------------------------------------


Current thread: