SlideShare a Scribd company logo
1 of 2
Download to read offline
CWASP DUBAI 2014
(we45 Certified Web Application Security Professional)
A G E N D A
DAY 1
About the Trainer
,
advent of the World Wide Web, a brief
Session 1
9: 00 to 10:30
The Dismal State of Web Application Security
Details relating to the
History of significant technologies and elements of the Web
10:30 to 10:45 Break
Session 2
10:45 to 12:15
Basic Concepts of Information Security
Information Security Concepts that form the bedrock of the
understanding of Web Application Security
Session 3
12:15 to 13:00
Introduction to Web Application Security
Understanding the need for Web Application Security and its
challenges faced by Modern Enterprises
13:00 to 14:00 Lunch
Session 4
14:00 to 14:45
Significant Web Application Breaches
An exploration of significant attacks against web applications
with a Real life Case Study
Session 5
14:45 to 15:30
Web Application Risk Assessment
Exploring methods to perform Risk Assessment for Web
Applications
15:30 to 15:45 Break
Session 5
15:45 to 17:00
Web Application Threat Analysis and Threat Modelling
Identifying Threat Models for Web Application & Integrating
Security into the SDLC
APPSEC
WORKSHOP
April 8th & 9th 2014 Emirates Grand Hotel, Dubai
Mission: Green Method brings to Dubai, a 2-day we45 Certified Workshop
on Core Application Security principles for Application Developers. CWASP is
arriving for the first time in the Dubai after successful rendition of the course in
the several countries.
Aimed at the Product Developers, Architects, Program Managers and Testers,
CWASP aims to equip the trainees with platform and technology agnostic
remediation strategies against application security vulnerabilities.In addition to
the updated concepts of OWASP Top 10 - 2013,the workshop is replete with real
world case studies,demonstrations and hands on exercises.
Abhay has performed over 300 Application Security
Assessments for a wide array of industry verticals,
including, banking, IT/ITES, IT Products,
manufacturing, and many more.
He also provides the "Hacker's View" to application
security after having performed numerous
Application focused Penetration Tests and assisted
law enforcement agencies in some of the major
application security breaches.
Abhay's work has been featured in several
magazines, newspapers, security specific journals
and portals. He has also developed multiple tools and
scripts to use specifically for Application Security
Testing and Assurance. Abhay serves as the Chief
Technology Officer at we45.
Abhay is a Web Application Security Specialist.
He has authored two books,
'Secure Java: For Web Application
Development' and 'PCI Compliance:
A Definitive Guide' for CRC Press, USA.
End of the day’s Program
Abhay Bhargav
CISA , CISSP, SANS GWAPT, ISO 27001 LA
A G E N D A
DAY 2
CWASP DUBAI 2014
APPSEC
WORKSHOP
End of the Program
Course Details
Session 6
9: 30 to 11:00
OWASP Top 10
Exploring the details of the OWASP Top 10 with
Workshop Exercises and Real life incidents
and anecdotes
Standard Rate : $650 per Trainee
(Early Bird offer for registering before
March 19th
: $500)
ISACA Member’s Rate : $500
(Early Bird offer for registering before
March 19th
: $400)
Delegates should provide their ISACA
Member ID
Group Rate : $800 (For 2 Participants
from the same organization)
REGISTER IMMEDIATELY
Write to:
training@greenmethodonline.com
OR
Call:
Neethu Pillai @ +971 55 169 6204
VISIT
www.greenmethodonline.com/appsec.htm
11:00 to 11:15 Break
Session 6
11:15 to 13: 30
OWASP Top 10
Exploring the details of the OWASP Top 10 with
Workshop Exercises and Real life incidents
and anecdotes
13:30 to 14:30 Lunch
Session 7
14:30 to 16:00
Application Security Controls and Best Practices
Recapitulating the vulnerabilities of the OWASP
Top 10 and identifying Application Security Best
Practices for Web Applications
16:00 to 16:15 Break
Session 7
16:15 to 17:30
Application Security Controls and Best Practices
Recapitulating the vulnerabilities of the OWASP
Top 10 and identifying Application Security Best
Practices for Web Applications
we45 Solutions India (P) Ltd.
#1439, 22nd Main, Banashankari
Bangalore, India
The Course designed and the Certificate issued by:
CWASP Dubai is a hands-on interactive Workshop.
The delegates are required to bring their laptops
to the program.

More Related Content

Similar to Appsec training gme

Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015Minded Security
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)Owasp top 10 2017 (en)
Owasp top 10 2017 (en)PrashantDhakol
 
OWASP_Top_10-2017_(en).pdf.pdf
OWASP_Top_10-2017_(en).pdf.pdfOWASP_Top_10-2017_(en).pdf.pdf
OWASP_Top_10-2017_(en).pdf.pdfSamSepiolRhodes
 
529 owasp top 10 2013 - rc1[1]
529 owasp top 10   2013 - rc1[1]529 owasp top 10   2013 - rc1[1]
529 owasp top 10 2013 - rc1[1]geeksec80
 
529 owasp top 10 2013 - rc1[1]
529 owasp top 10   2013 - rc1[1]529 owasp top 10   2013 - rc1[1]
529 owasp top 10 2013 - rc1[1]geeksec0306
 
Owasp top 10 2013 - rc1
Owasp top 10   2013 - rc1Owasp top 10   2013 - rc1
Owasp top 10 2013 - rc1Ajay Ohri
 
OWASP - Building Secure Web Applications
OWASP - Building Secure Web ApplicationsOWASP - Building Secure Web Applications
OWASP - Building Secure Web Applicationsalexbe
 
BioCatalyst_Brochure_classes_052815_nocarfair
BioCatalyst_Brochure_classes_052815_nocarfairBioCatalyst_Brochure_classes_052815_nocarfair
BioCatalyst_Brochure_classes_052815_nocarfairYoanne Clovis
 
Review Paper ( Research Articles )
Review Paper ( Research Articles )Review Paper ( Research Articles )
Review Paper ( Research Articles )SaadSaif6
 
White Paper: Leveraging The OWASP Top Ten to Simplify application security a...
White Paper: Leveraging The OWASP Top Ten to  Simplify application security a...White Paper: Leveraging The OWASP Top Ten to  Simplify application security a...
White Paper: Leveraging The OWASP Top Ten to Simplify application security a...Security Innovation
 
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр АнтухOWASP Russia
 
App sec owasp from developers prospective
App sec owasp from developers prospectiveApp sec owasp from developers prospective
App sec owasp from developers prospectiveSecurity Innovation
 
Veracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green MethodVeracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green MethodSalil Kumar Subramony
 
Owasp top 10 2013
Owasp top 10   2013Owasp top 10   2013
Owasp top 10 2013Aryan G
 
Owasp top 10_-_2013
Owasp top 10_-_2013Owasp top 10_-_2013
Owasp top 10_-_2013Edho Armando
 

Similar to Appsec training gme (20)

Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
 
Owasp top 10
Owasp top 10  Owasp top 10
Owasp top 10
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)Owasp top 10 2017 (en)
Owasp top 10 2017 (en)
 
OWASP_Top_10-2017_(en).pdf.pdf
OWASP_Top_10-2017_(en).pdf.pdfOWASP_Top_10-2017_(en).pdf.pdf
OWASP_Top_10-2017_(en).pdf.pdf
 
Infosec for web apps 2014_18november2014
Infosec for web apps 2014_18november2014Infosec for web apps 2014_18november2014
Infosec for web apps 2014_18november2014
 
529 owasp top 10 2013 - rc1[1]
529 owasp top 10   2013 - rc1[1]529 owasp top 10   2013 - rc1[1]
529 owasp top 10 2013 - rc1[1]
 
529 owasp top 10 2013 - rc1[1]
529 owasp top 10   2013 - rc1[1]529 owasp top 10   2013 - rc1[1]
529 owasp top 10 2013 - rc1[1]
 
Owasp top 10 2013 - rc1
Owasp top 10   2013 - rc1Owasp top 10   2013 - rc1
Owasp top 10 2013 - rc1
 
OWASP - Building Secure Web Applications
OWASP - Building Secure Web ApplicationsOWASP - Building Secure Web Applications
OWASP - Building Secure Web Applications
 
BioCatalyst_Brochure_classes_052815_nocarfair
BioCatalyst_Brochure_classes_052815_nocarfairBioCatalyst_Brochure_classes_052815_nocarfair
BioCatalyst_Brochure_classes_052815_nocarfair
 
Review Paper ( Research Articles )
Review Paper ( Research Articles )Review Paper ( Research Articles )
Review Paper ( Research Articles )
 
White Paper: Leveraging The OWASP Top Ten to Simplify application security a...
White Paper: Leveraging The OWASP Top Ten to  Simplify application security a...White Paper: Leveraging The OWASP Top Ten to  Simplify application security a...
White Paper: Leveraging The OWASP Top Ten to Simplify application security a...
 
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
[1.1] Почему вам стоит поучаствовать в жизни OWASP Russia - Александр Антух
 
App sec owasp from developers prospective
App sec owasp from developers prospectiveApp sec owasp from developers prospective
App sec owasp from developers prospective
 
Veracode CISO Round Table
Veracode CISO Round TableVeracode CISO Round Table
Veracode CISO Round Table
 
Veracode ciso riyadh
Veracode ciso riyadhVeracode ciso riyadh
Veracode ciso riyadh
 
Veracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green MethodVeracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green Method
 
OWASP Top Ten 2013
OWASP Top Ten 2013OWASP Top Ten 2013
OWASP Top Ten 2013
 
Owasp top 10 2013
Owasp top 10   2013Owasp top 10   2013
Owasp top 10 2013
 
Owasp top 10_-_2013
Owasp top 10_-_2013Owasp top 10_-_2013
Owasp top 10_-_2013
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Appsec training gme

  • 1. CWASP DUBAI 2014 (we45 Certified Web Application Security Professional) A G E N D A DAY 1 About the Trainer , advent of the World Wide Web, a brief Session 1 9: 00 to 10:30 The Dismal State of Web Application Security Details relating to the History of significant technologies and elements of the Web 10:30 to 10:45 Break Session 2 10:45 to 12:15 Basic Concepts of Information Security Information Security Concepts that form the bedrock of the understanding of Web Application Security Session 3 12:15 to 13:00 Introduction to Web Application Security Understanding the need for Web Application Security and its challenges faced by Modern Enterprises 13:00 to 14:00 Lunch Session 4 14:00 to 14:45 Significant Web Application Breaches An exploration of significant attacks against web applications with a Real life Case Study Session 5 14:45 to 15:30 Web Application Risk Assessment Exploring methods to perform Risk Assessment for Web Applications 15:30 to 15:45 Break Session 5 15:45 to 17:00 Web Application Threat Analysis and Threat Modelling Identifying Threat Models for Web Application & Integrating Security into the SDLC APPSEC WORKSHOP April 8th & 9th 2014 Emirates Grand Hotel, Dubai Mission: Green Method brings to Dubai, a 2-day we45 Certified Workshop on Core Application Security principles for Application Developers. CWASP is arriving for the first time in the Dubai after successful rendition of the course in the several countries. Aimed at the Product Developers, Architects, Program Managers and Testers, CWASP aims to equip the trainees with platform and technology agnostic remediation strategies against application security vulnerabilities.In addition to the updated concepts of OWASP Top 10 - 2013,the workshop is replete with real world case studies,demonstrations and hands on exercises. Abhay has performed over 300 Application Security Assessments for a wide array of industry verticals, including, banking, IT/ITES, IT Products, manufacturing, and many more. He also provides the "Hacker's View" to application security after having performed numerous Application focused Penetration Tests and assisted law enforcement agencies in some of the major application security breaches. Abhay's work has been featured in several magazines, newspapers, security specific journals and portals. He has also developed multiple tools and scripts to use specifically for Application Security Testing and Assurance. Abhay serves as the Chief Technology Officer at we45. Abhay is a Web Application Security Specialist. He has authored two books, 'Secure Java: For Web Application Development' and 'PCI Compliance: A Definitive Guide' for CRC Press, USA. End of the day’s Program Abhay Bhargav CISA , CISSP, SANS GWAPT, ISO 27001 LA
  • 2. A G E N D A DAY 2 CWASP DUBAI 2014 APPSEC WORKSHOP End of the Program Course Details Session 6 9: 30 to 11:00 OWASP Top 10 Exploring the details of the OWASP Top 10 with Workshop Exercises and Real life incidents and anecdotes Standard Rate : $650 per Trainee (Early Bird offer for registering before March 19th : $500) ISACA Member’s Rate : $500 (Early Bird offer for registering before March 19th : $400) Delegates should provide their ISACA Member ID Group Rate : $800 (For 2 Participants from the same organization) REGISTER IMMEDIATELY Write to: training@greenmethodonline.com OR Call: Neethu Pillai @ +971 55 169 6204 VISIT www.greenmethodonline.com/appsec.htm 11:00 to 11:15 Break Session 6 11:15 to 13: 30 OWASP Top 10 Exploring the details of the OWASP Top 10 with Workshop Exercises and Real life incidents and anecdotes 13:30 to 14:30 Lunch Session 7 14:30 to 16:00 Application Security Controls and Best Practices Recapitulating the vulnerabilities of the OWASP Top 10 and identifying Application Security Best Practices for Web Applications 16:00 to 16:15 Break Session 7 16:15 to 17:30 Application Security Controls and Best Practices Recapitulating the vulnerabilities of the OWASP Top 10 and identifying Application Security Best Practices for Web Applications we45 Solutions India (P) Ltd. #1439, 22nd Main, Banashankari Bangalore, India The Course designed and the Certificate issued by: CWASP Dubai is a hands-on interactive Workshop. The delegates are required to bring their laptops to the program.