LEARN TO CODE
Intro to HTML & CSS
WHEN: Saturday, Oct 5, 2013. TIME: 10am – 4pm. COST: $55. Lunch provided.
Whether you’re an adult or a youth, if you’re looking to get your feet wet when it comes to coding, then this is the workshop for you! HTML & CSS are the fundamental building blocks of the web and knowledge of them is a necessity if you’re interested in things like web development, creating digital products, or even writing software! It’s easy to learn and was designed so that everyone – even non-programmers – can do it.
This one day workshop is the quickest way to get started. We will guide you through the basics of HTML and CSS, you’ll build a beautiful one-page website, and we’ll answer any questions you may have along the way. We’ll start at 10am, take a lunch break at 12:30, and end at 4pm.
COMMUNITY FUNDED SCHOLARSHIPS:
If you’d like to attend but cannot afford the cost, please request a Planet Linux scholarship.
WEB APPLICATION SECURITY
OWASP Top 10 Training
This course undertakes a deep study of the OWASP Top 10 Web Application Security Risks. Each risk will be explored in terms of its vulnerability to be found in software, ways to prevent the risk and code scenarios depicting a successful attack. In addition, manual code review techniques pertinent to risks such as the Cross Site Scripting (XSS) attack will be tested in lab exercises.
- Learn about the OWASP Top 10 2013 covering all aspects.
- Express the vulnerabilities and exploits affecting modern web applications.
- Identify vulnerabilities; understand why they happen, what are exploits and what are defenses.
- Evaluate how real organizations have been affected by these exploits.
- Rise security awareness and get a good grasp on core security principles.
Methods, Techniques & Tools
This comprehensive course will go over the tools and methodologies that are used during penetration tests in enterprise network environments. The course will utilize a lab environment for hands on instruction of manual penetration testing methods, as well as training on the use of exploitation frameworks, such as Metasploit. This course will focus on methodology, processes, tools, and techniques. By the end of the course, the student will have an understanding of the underlying workings of network exploitation, and will have experience in the successful execution of attacks.