Training

    Here are all the trainign sessions that are happening before the Summit (15th/19th of June).

    This year we are using the Hey Summit platform to manage the session registation and bookings

    Book it now using https://pre-summit-training-sessions.heysummit.com/tickets/

    TRAINING SESSIONS



    Schedule (Week 1) - 1st to 5th of June

    Monday - 12hTuesday - 13thWednesday - 14thThursday - 15thFriday - 16th

    Schedule (Week 2) - 8th to 12th of June

    Monday - 12hTuesday - 13thWednesday - 14thThursday - 15thFriday - 16th
    15:00 - 16:00
    WS-2

    Schedule - Table view

    Week 1 - 1st to 5th of June

    TitleSession TypeDay (June 2021)WhenDelivered byTrackRegister
    Chef InSpec (Compliance as Code)training-session2nd - Tuesday15:00 - 16:00Joshua Jebarajbook now
    Cloud Security 101training-session2nd - Tuesday10:30 - 12:00Kriti Mohun Kriti Mohunbook now
    Covid Apps Analysistraining-session1st - Monday16:00 - 17:00Mark Carney Jay Harrisbook now
    Covid Safe Paths - Threat Modeling Part 1training-session4th - Thursday10:30 - 12:00Dinis Cruz Dinis Cruz Mark Carney Jay Harris Adam Leon Smith Adam Leon Smithbook now
    Covid Safe Paths - Threat Modeling Part 2training-session5th - Friday10:30 - 12:00Dinis Cruz Dinis Cruz Adam Leon Smith Adam Leon Smithbook now
    Drinks and Persona Building: Creating Adversary Trading Cards (1st Session)training-session1st - Monday17:00 - 18:00Mark MillerThreat Modelingbook now
    Hacking Glasswall SDk & Cloud - Part 2training-session5th - Friday16:00 - 17:00Dinis Cruz Dinis Cruzbook now
    Introduction to Wardley Mapping by Goher Mohammadtraining-session2nd - Tuesday15:00 - 16:00Goher MohammadWardley Mapsbook now
    Jira-Jupyter integration introductiontraining-session5th - Friday15:00 - 16:00Tatevik StepanyanDevSecOpsbook now
    MultiJuicer Introductiontraining-session2nd - TuesdayJannik Hollenbach Robert Seedorffbook now
    OWASP Juice Shop introductiontraining-session2nd - Tuesday16:00 - 17:00Bjoern Kimminichbook now
    Threat Modeling - Cloud Functions as Detonation Chambers - Part 1training-session4th - Thursday16:00 - 17:00Dinis Cruz Dinis Cruzbook now
    Threat Modeling - O365 SaaS Providertraining-session1st - Monday15:00 - 16:00James Bore James BoreThreat Modelingbook now
    Trusted Partner Network demotraining-session4th - Thursday15:00 - 16:00Ben Schofield Ben Schofieldbook now
    Vulnerabilities review of an Covid Applicationuser-session3rd - Wednesday16:00 - 17:00Mike Minchintonbook now
    Wardley Mappping introduction with Cat Sweteltraining-session3rd - Wednesday15:00 - 16:00Cat SwetelWardley Mapsbook now
    Wardley Maps First Aiduser-session5th - Friday15:00 - 16:00Petra Vukmirovic Petra VukmirovicWardley Mapsbook now

    Week 2 - 8th to 12th of June

    TitleSession TypeDay (June 2021)WhenDelivered byTrackRegister
    Applying OWASP Web Security Testing Guide (Vandana V)training-session12th - Friday16:00 - 17:00Vandana Verma Vandana Vermabook now
    Cyber and Privacy Risk Management 101training-session11th - Wednesday15:00 - 16:00Demi Ben-Ari Dov Goldmanbook now
    DAST - Dynamic Analysis integration labtraining-session10th - Wednesday10:30 - 12:00Mohammed A. ImranDevSecOpsbook now
    Dependency scanning labtraining-session11th - Thursday10:30 - 12:00Mohammed A. ImranDevSecOpsbook now
    GitHub Actions & code scanning with CodeQLtraining-session9th - Tuesday15:00 - 16:00Sasha RosenbaumDevSecOpsbook now
    How to measure and visualise ISG standardstraining-session10th - Wednesday15:00 - 16:00Elvin White Elvin White Vinh Tram Greg Mannbook now
    Incident Scenario Exercisetraining-session10th - Wednesday16:00 - 17:00Dinis Cruz Dinis Cruz James Bore James Bore Didar Gelici Didar Gelici Petra Vukmirovic Petra Vukmirovicbook now
    Infrastructure scan & Encryptiontraining-session11th - Thursday15:00 - 16:00Barak SchosterDevSecOpsbook now
    Introduction to Threat Modeling by Avi Douglentraining-session11th - Thursday10:30 - 12:00Avi Douglen Avi DouglenThreat Modelingbook now
    Introduction to Wardley Mapping by Chris Danieltraining-session9th - Tuesday10:30 - 12:00Chris DanielWardley Mapsbook now
    NCSC - Safe File Import Patterntraining-session11th - Thursday15:00 - 16:00Paul Burke Paul Burke Tim Lunnbook now
    O365 Security - Anti-Phishing best practises and Demotraining-session11th - Thursday16:00 - 17:00Abbas Haidar Abbas Haidarbook now
    Office Documents ISG - How to automate Inspection and Sanitization Guidance testingtraining-session11th - Thursday16:00 - 17:00Greg Mann Vinh Tram Elvin White Elvin Whitebook now
    Oh dear, my laptop is hacked!training-session9th - Tuesday16:00 - 17:00Petra Vukmirovic Petra Vukmirovic Sara Notarobook now
    OWASP Juice Shop Introductiontraining-session11th - Thursday16:00 - 17:00Bjoern Kimminichbook now
    Owning AppSec Automation with Pythontraining-session10th - Wednesday15:00 - 16:00Abhay BhargavDevSecOpsbook now
    PDF ISG - Inspection and Sanitization Guidance for Portable Document Format and JPG ISG - How to automate Inspection and Sanitization Guidance testingtraining-session12th - Friday16:00 - 17:00Vinh Tram Greg Mann Elvin White Elvin Whitebook now
    SAST - Static Analysis integration labtraining-session9th - Tuesday10:30 - 12:00Mohammed A. ImranDevSecOpsbook now
    Secrets and credentials scanning labtraining-session12th - Friday10:30 - 12:00Mohammed A. ImranDevSecOpsbook now
    SEMI-SOCIAL: Improv Comedy as a Social Engineering Tooltraining-session8th - Monday17:00 - 18:00Dave Mattinglybook now
    SOCIAL - Cards Against Humanity gameuser-session12th - Friday17:00 - 18:00Tony Richardsbook now
    Social Engineering - from recon to executiontraining-session8th - Monday16:00 - 17:00Stuart Peckbook now
    Supply Chain Attacks : The rise of the Third Party Pooperstraining-session10th - Wednesday10:30 - 12:00Demi Ben-Ari Elad Shapirabook now
    Threat Modeling - ICAPtraining-session12th - Friday10:30 - 12:00Dinis Cruz Dinis Cruz Paul GerardThreat Modelingbook now
    Threat Modeling Introductiontraining-session8th - Monday10:30 - 12:00Dinis Cruz Dinis Cruz Petra Vukmirovic Petra VukmirovicThreat Modelingbook now
    To DevSecOps or not to DevSecOps: is that a question?training-session8th - Monday15:00 - 16:00Mario Platt Mario PlattDevSecOpsbook now
    Using Wardley mapping for Security Strategy and Architecture developmenttraining-sessionMon15:00 - 16:00Mario Platt Mario PlattWardley Mapsbook now
    Wardley Mapping (intermediate)training-session12th - Friday15:00 - 16:00Tony RichardsWardley Mapsbook now
    What are ISGs and how to convert ISGs into checklists?training-session9th - Tuesday16:00 - 17:00Elvin White Elvin White Dinis Cruz Dinis Cruzbook now
    What security exploits are prevented by implementing ISGstraining-session11th - Thursday15:00 - 16:00Elvin White Elvin White Greg Mann Vinh Trambook now