Training

    Here are all the trainign sessions that are happening before the Summit (15th/19th of June).

    This year we are using the Hey Summit platform to manage the session registation and bookings

    Book it now using https://pre-summit-training-sessions.heysummit.com/tickets/



    Schedule (Week 1) - 1st to 5th of June

    MondayTuesdayWednesdayThursdayFriday
    WS-1
    11:00 - 13:00
    WS-2
    14:00 - 16:00
    WS-3
    17:00 - 19:00
    BK-3
    19:00 - 20:00
    WS-4
    20:00 - 22:00

    Schedule (Week 2) - 8th to 12th of June

    MondayTuesdayWednesdayThursdayFriday
    WS-1
    11:00 - 13:00
    WS-2
    14:00 - 16:00
    WS-3
    17:00 - 19:00
    WS-4
    20:00 - 22:00

    Schedule - Table view

    Week 1 - 1st to 5th of June

    TitleSession TypeDay (June 2020)WhenDelivered byTrackRegister
    Chef InSpec (Compliance as Code)training-session2nd - Tuesday14:00 - 16:00Joshua Jebaraj Joshua JebarajCloud Securitybook now
    Cloud Security 101training-session2nd - Tuesday11:00 - 13:00Kriti Mohun Kriti MohunCloud Securitybook now
    Covid Apps Analysistraining-session1st - Monday17:00 - 19:00Mark Carney Mark Carney Jay Harris Jay HarrisCovidbook now
    Covid Safe Paths - Threat Modeling Part 1training-session4th - Thursday11:00 - 13:00Dinis Cruz Dinis Cruz Mark Carney Mark Carney Jay Harris Jay Harris Adam Leon Smith Adam Leon SmithCovidbook now
    Covid Safe Paths - Threat Modeling Part 2training-session5th - Friday11:00 - 13:00Dinis Cruz Dinis Cruz Adam Leon Smith Adam Leon SmithCovidbook now
    Drinks and Persona Building: Creating Adversary Trading Cards (1st Session)training-session1st - Monday20:00 - 22:00Mark Miller Mark MillerThreat Modelingbook now
    Hacking Glasswall SDk & Cloud - Part 2training-session5th - Friday17:00 - 19:00Dinis Cruz Dinis CruzHacking and Defendingbook now
    Introduction to Wardley Mapping by Goher Mohammadtraining-session2nd - Tuesday14:00 - 16:00Goher Mohammad Goher MohammadWardley Mapsbook now
    Jira-Jupyter integration introductiontraining-session5th - Friday14:00 - 16:00Tatevik StepanyanDevSecOpsbook now
    MultiJuicer Introductiontraining-session2nd - Tuesday19:00 - 20:00Jannik Hollenbach Jannik Hollenbach Robert Seedorff Robert SeedorffOWASP Juice Shopbook now
    OWASP Juice Shop introductiontraining-session2nd - Tuesday17:00 - 19:00Bjoern Kimminich Bjoern KimminichOWASP Juice Shopbook now
    Threat Modeling - Cloud Functions as Detonation Chambers - Part 1training-session4th - Thursday17:00 - 19:00Dinis Cruz Dinis CruzHacking and Defendingbook now
    Threat Modeling - O365 SaaS Providertraining-session1st - Monday14:00 - 16:00James Bore James BoreThreat Modelingbook now
    Trusted Partner Network demotraining-session4th - Thursday14:00 - 16:00Ben Schofield Ben SchofieldCISO and Risk Managementbook now
    Vulnerabilities review of an Covid Applicationuser-session3rd - Wednesday17:00 - 19:00Mike Minchinton Mike MinchintonCovidbook now
    Wardley Mappping introduction with Cat Sweteltraining-session3rd - Wednesday14:00 - 16:00Cat Swetel Cat SwetelWardley Mapsbook now
    Wardley Maps First Aiduser-session5th - Friday14:00 - 16:00Petra Vukmirovic Petra VukmirovicWardley Mapsbook now

    Week 2 - 8th to 12th of June

    TitleSession TypeDay (June 2020)WhenDelivered byTrackRegister
    Applying OWASP Web Security Testing Guide (Vandana V)training-session12th - Friday17:00 - 19:00Vandana Verma Vandana VermaOWASP Projectsbook now
    Cyber and Privacy Risk Management 101training-session11th - Wednesday14:00 - 16:00Demi Ben-Ari Demi Ben-Ari Dov Goldman Dov GoldmanCISO and Risk Managementbook now
    DAST - Dynamic Analysis integration labtraining-session10th - Wednesday11:00 - 13:00Mohammed A. Imran Mohammed A. ImranDevSecOpsbook now
    Dependency scanning labtraining-session11th - Thursday11:00 - 13:00Mohammed A. Imran Mohammed A. ImranDevSecOpsbook now
    GitHub Actions & code scanning with CodeQLtraining-session9th - Tuesday14:00 - 16:00Sasha Rosenbaum Sasha RosenbaumDevSecOpsbook now
    How to measure and visualise ISG standardstraining-session10th - Wednesday14:00 - 16:00Elvin White Elvin White Vinh Tram Vinh Tram Greg Mann Greg MannISGbook now
    Incident Scenario Exercisetraining-session10th - Wednesday17:00 - 19:00Dinis Cruz Dinis Cruz James Bore James Bore Didar Gelici Didar Gelici Petra Vukmirovic Petra VukmirovicCISO and Risk Managementbook now
    Infrastructure scan & Encryptiontraining-session11th - Thursday14:00 - 16:00Barak Schoster Barak SchosterDevSecOpsbook now
    Introduction to Threat Modeling by Avi Douglentraining-session11th - Thursday11:00 - 13:00Avi Douglen Avi DouglenThreat Modelingbook now
    Introduction to Wardley Mapping by Chris Danieltraining-session9th - Tuesday11:00 - 13:00Chris Daniel Chris DanielWardley Mapsbook now
    NCSC - Safe File Import Patterntraining-session11th - Thursday14:00 - 16:00Paul Burke Paul Burke Tim Lunn Tim Lunnbook now
    O365 Security - Anti-Phishing best practises and Demotraining-session11th - Thursday17:00 - 19:00Abbas Haidar Abbas HaidarHacking and Defendingbook now
    Office Documents ISG - How to automate Inspection and Sanitization Guidance testingtraining-session11th - Thursday17:00 - 19:00Greg Mann Greg Mann Vinh Tram Vinh Tram Elvin White Elvin WhiteISGbook now
    Oh dear, my laptop is hacked!training-session9th - Tuesday17:00 - 19:00Petra Vukmirovic Petra Vukmirovic Sara Notaro Sara NotaroHacking and Defendingbook now
    OWASP Juice Shop Introductiontraining-session11th - Thursday17:00 - 19:00Bjoern Kimminich Bjoern KimminichOWASP Juice Shopbook now
    Owning AppSec Automation with Pythontraining-session10th - Wednesday14:00 - 16:00Abhay Bhargav Abhay BhargavDevSecOpsbook now
    PDF ISG - Inspection and Sanitization Guidance for Portable Document Format and JPG ISG - How to automate Inspection and Sanitization Guidance testingtraining-session12th - Friday17:00 - 19:00Vinh Tram Vinh Tram Greg Mann Greg Mann Elvin White Elvin WhiteISGbook now
    SAST - Static Analysis integration labtraining-session9th - Tuesday11:00 - 13:00Mohammed A. Imran Mohammed A. ImranDevSecOpsbook now
    Secrets and credentials scanning labtraining-session12th - Friday11:00 - 13:00Mohammed A. Imran Mohammed A. ImranDevSecOpsbook now
    SEMI-SOCIAL: Improv Comedy as a Social Engineering Tooltraining-session8th - Monday20:00 - 22:00Dave Mattingly Dave MattinglySocialbook now
    SOCIAL - Cards Against Humanity gameuser-session12th - Friday20:00 - 22:00Tony Richards Tony RichardsSocialbook now
    Social Engineering - from recon to executiontraining-session8th - Monday17:00 - 19:00Stuart Peck Stuart PeckHacking and Defendingbook now
    Supply Chain Attacks : The rise of the Third Party Pooperstraining-session10th - Wednesday11:00 - 13:00Demi Ben-Ari Demi Ben-Ari Elad Shapira Elad ShapiraCISO and Risk Managementbook now
    Threat Modeling - ICAPtraining-session12th - Friday11:00 - 13:00Dinis Cruz Dinis Cruz Paul Gerard Paul GerardThreat Modelingbook now
    Threat Modeling Introductiontraining-session8th - Monday11:00 - 13:00Dinis Cruz Dinis Cruz Petra Vukmirovic Petra VukmirovicThreat Modelingbook now
    To DevSecOps or not to DevSecOps: is that a question?training-session8th - Monday14:00 - 16:00Mario Platt Mario PlattDevSecOpsbook now
    Using Wardley mapping for Security Strategy and Architecture developmenttraining-session10th - Wednesday14:00 - 16:00Mario Platt Mario PlattWardley Mapsbook now
    Wardley Mapping (intermediate)training-session12th - Friday14:00 - 16:00Tony Richards Tony RichardsWardley Mapsbook now
    What are ISGs and how to convert ISGs into checklists?training-session9th - Tuesday17:00 - 19:00Elvin White Elvin White Dinis Cruz Dinis CruzISGbook now
    What security exploits are prevented by implementing ISGstraining-session11th - Thursday14:00 - 16:00Elvin White Elvin White Greg Mann Greg Mann Vinh Tram Vinh TramISGbook now