|
|
| Line 1: |
Line 1: |
| − | This page provide a commented overview of the OWASP presentations available.<br>
| + | :redirect [[OWASP Education Presentation]] |
| − | Please use the last line of the tables as template.<br>
| + | Moved to [[OWASP Education Presentation]] |
| − | Presentions can be tracked through:
| |
| − | * the [http://www.owasp.org/index.php/Category:OWASP_Presentations OWASP Presentations Category]
| |
| − | * [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference Past OWASP Conference agenda's]
| |
| − | * From the chapter pages
| |
| − | Everybody is encouraged to link the presentations and add their findings on this page !
| |
| − | There are currently hundreds of presentations all over the OWASP web site.
| |
| − | If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76.
| |
| − | Feel free to “mine” them and add them to the overview.
| |
| − | | |
| − | == OWASP Project Presentations ==
| |
| − | {| border="1" cellpadding="2"
| |
| − | |+ OWASP Project Presentations
| |
| − | !width="30%" |Title
| |
| − | !width="40%" |Comment
| |
| − | !width="15%" |Level
| |
| − | !width="15%" |Rating (1-10)
| |
| − | |-valign="top"
| |
| − | |[http://www.owasp.org/images/a/af/OWASP_Testing_Guide_Presentation.zip The OWASP Testing Guide (Jeff Williams)] || Overview of the OWASP Testing Guide || Novice || 7
| |
| − | |-valign="top"
| |
| − | |Example (include link) || Fill in your comments || Novice/Intermediate/Expert || 1:bad - 10: the best
| |
| − | |}
| |
| − | | |
| − | <br>
| |
| − | | |
| − | == Web Application Security Presentations ==
| |
| − | {| border="1" cellpadding="2"
| |
| − | |+ Web Application Security Presentations
| |
| − | !width="30%" |Title
| |
| − | !width="40%" |Comment
| |
| − | !width="15%" |Level
| |
| − | !width="15%" |Rating (1-10)
| |
| − | |-valign="top"
| |
| − | |[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert|| 9
| |
| − | |-valign="top"
| |
| − | |[[http://www.owasp.org/images/7/7d/Advanced_Topics_on_SQL_Injection_Protection.ppt Advanced Topics on SQL Injection Protection (Sam NG)] || 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7. || Intermediate|| 8
| |
| − | |-valign="top"
| |
| − | |[[http://www.owasp.org/images/d/d1/AppSec2005DC-Alex_Stamos-Attacking_Web_Services.ppt Attacking Web Services (Alex Stamos)] || Web Services Introduction and Attacks || Intermediate|| 5
| |
| − | |-valign="top"
| |
| − | |Example (include link) || Fill in your comments || Novice/Intermediate/Expert || 1:bad - 10: the best
| |
| − | |}
| |
| − | | |
| − | | |
| − | <br>
| |
| − | | |
| − | | |
| − | | |
| − | == Chapter Presentations ==
| |
| − | {| border="1" cellpadding="2"
| |
| − | |+ Chapter Presentations
| |
| − | !width="30%" |Title
| |
| − | !width="30%" |Comment
| |
| − | !width="10%" |Level
| |
| − | !width="10%" |Rating (1-10)
| |
| − | !width="10%" |Month
| |
| − | !width="10%" |Chapter
| |
| − | | |
| − | |-valign="top"
| |
| − | |[http://www.disenchant.ch/blog/files/presentations/pres_20070206_04_svetsch_xss_worms.pdf XSS and XSS Worms (Sven Vetsch)] || XSS and XSS Worms || Intermediate || 7 || Feb 2007 || [[Switzerland|Switzerland]]
| |
| − | |-valign="top"
| |
| − | |[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update || Novice|| 7 || Jan 2007 || [[Belgium|Belgium]]
| |
| − | |-valign="top"
| |
| − | |[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_WebGoat-Pantera.zip WebGoat and Pantera presentation (Philippe Bogaerts)] || WebGoat and Pantera presentation || Novice || 7 || Jan 2007 || [[Belgium|Belgium]]
| |
| − | |-valign="top"
| |
| − | |[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_AOP_security.zip Security implications of AOP for secure software (Bart De Win)] || Security implications of AOP for secure software || Expert || 7 || Jan 2007 || [[Belgium|Belgium]]
| |
| − | |-valign="top"
| |
| − | |[http://www.owasp.org/images/1/12/OWASP_Denver_Nov-06_presentation.ppt testing for common security flaws (David Byrne)] || testing for common security flaws || Intermediate || 7 || Nov 2006 || [[Denver|Denver]]
| |
| − | |-valign="top"
| |
| − | |[http://www.owasp.org/images/7/7c/Owasp-olli.pdf 40-ish slides on analyzing threats (Olli)] || Analyzing Threats || Novice || 7 || Dec 2006 || [[Helsinki|Helsinki]]
| |
| − | |-valign="top"
| |
| − | |[http://www.owasp.org/images/2/2c/KC_Dec2006_Attacking_The_App.pdf Attacking the Application (Dave Ferguson)] || Vulnerabilities, attacks and coding suggestions || Intermediate || 7 || Dec 2006 || [[Kansas City|Kansas City]]
| |
| − | |-valign="top"
| |
| − | |[http://www.owasp.org/images/6/6a/KC_Dec2006_Ajax_Security_Concerns.pdf Ajax Security Concerns (Rohini Sulatycki)] || Ajax Security Concerns || Intermediate || 7 || Dec 2006 || [[Kansas City|Kansas City]]
| |
| − | | |
| − | |-valign="top"
| |
| − | |Example (include link) || Fill in your comments || Novice/Intermediate/Expert || 1:bad - 10: the best || Mon Year || Chapter
| |
| − | |}
| |
| − | | |
| − | [[Category:OWASP Education Project]]
| |
| − | [[Category:OWASP Presentations]]
| |
| − | [[Category:Chapter Resources]]
| |