|
|
| (9 intermediate revisions by one other user not shown) |
| Line 1: |
Line 1: |
| − | This page provide a commented overview of the OWASP presentations available.<br>
| + | See [[:Category:OWASP_Education_Project]] |
| − | Please use the last line of the tables as template.<br>
| |
| − | Presentions can be tracked through:
| |
| − | * the [http://www.owasp.org/index.php/Category:OWASP_Presentations OWASP Presentations Category]
| |
| − | * [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference Past OWASP Conference agenda's]
| |
| − | * From the chapter pages
| |
| − | Everybody is encouraged to link the presentations and add their findings on this page !
| |
| − | There are currently hundreds of presentations all over the OWASP web site.
| |
| − | If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76.
| |
| − | Feel free to “mine” them and add them to the overview.
| |
| − | | |
| − | == OWASP Project Presentations ==
| |
| − | {| border="1" cellpadding="2"
| |
| − | |+ OWASP Project Presentations
| |
| − | !width="30%" |Title
| |
| − | !width="40%" |Comment
| |
| − | !width="15%" |Level
| |
| − | !width="15%" |Rating (1-10)
| |
| − | |-valign="top"
| |
| − | |[http://www.owasp.org/images/a/af/OWASP_Testing_Guide_Presentation.zip The OWASP Testing Guide (Jeff Williams)] || Overview of the OWASP Testing Guide || Novice || 7
| |
| − | |-valign="top"
| |
| − | |Example (include link) || Fill in your comments || Novice/Intermediate/Expert || 1:bad - 10: the best
| |
| − | |}
| |
| − | | |
| − | <br>
| |
| − | | |
| − | == Web Application Security Presentations ==
| |
| − | {| border="1" cellpadding="2"
| |
| − | |+ Web Application Security Presentations
| |
| − | !width="30%" |Title
| |
| − | !width="40%" |Comment
| |
| − | !width="15%" |Level
| |
| − | !width="15%" |Rating (1-10)
| |
| − | |-valign="top"
| |
| − | |[[http://www.owasp.org/images/7/74/Advanced_SQL_Injection.ppt Advanced SQL Injection (Victor Chapela)] || Detailed methodology for analyzing applications for SQL injection vulnerabilities || Expert|| 9
| |
| − | |-valign="top"
| |
| − | |Example (include link) || Fill in your comments || Novice/Intermediate/Expert || 1:bad - 10: the best
| |
| − | |}
| |
| − | | |
| − | <br>
| |