Tactical Defense

Josh Amishav-Zlatin july 23-24


$2000

Ends February 1

$2200

Ends June 1

$2400

Ends July 20

$2700

July 21-24


Overview

Ever wanted to create a WAF bypass exploit to compromise a web application? Do you want to detect attacks in real-time rather than finding a backdoor after you have been compromised? Do you want to protect your own web applications from Advanced Persistent Threats (APT)? This course will teach you how to achieve all of these goals.

News of web application hacks are reported on a daily basis. This is because developers often do not have the time or skills to focus on security, which is why WAFs offer an important added layer of protection. ModSecurity is an extremely popular open source web application firewall toolkit that can be used to help protect apps against known and 0-day vulnerabilities alike.

Based on the ModSecurity Handbook, this two-day boot-camp training is designed for people who want to quickly learn how to configure and deploy ModSecurity in the most effective manner possible. The course will cover topics such as the powerful rules language, extending functionality via the embedded Lua engine, and managing suspicious events via AuditConsole. Documented hands-on labs help students understand the inner workings of ModSecurity and how to deploy it securely. By leveraging the flexibility within ModSecurity, attendees will be able to write effective rules to mitigate complex web vulnerabilities.

Who should attend

Prerequisites

What to bring

Trainer

Josh Amishav-Zlatin is the Director of Research and Development at Pure Hacking where he focuses on web application defensive research and develops customized ModSecurity rulesets to help customers reduce risk associated with their web applications. Before licensing changes, he was among the top three third-party plugin developers for Nessus and is among the top ten data manglers in the OSVDB project. Josh specializes in web application penetration testing, FOSS based security solutions and is currently involved with the OWASP Core Rule Set, AuditConsole and WASC Threat Classification projects. He is a very active member of the ModSecurity community and frequently speaks on innovative web application firewall solutions.

Josh has over 10 years of experience in the IT security industry, working with both financial and government clients to help secure their critical applications. He has run numerous training courses for clients around the world. These courses include web application penetration testing, infrastructure penetration testing and security testing automation. These have been run both face-to-face and online.