This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP Security Ninjas AppSec Training Program"
Shruti.gupta (talk | contribs) (→Licensing) |
(→OWASP Security Ninjas) |
||
(One intermediate revision by one other user not shown) | |||
Line 6: | Line 6: | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
− | ==OWASP Security Ninjas== | + | ==OWASP Security Ninjas APPSEC Training Program== |
− | Security Ninjas is an open-source Application Security Training Program. | + | Security Ninjas is an open-source Application Security Training Program. |
==Description== | ==Description== | ||
Line 16: | Line 16: | ||
− | This program is free software: you can redistribute it and/or modify it under the terms of the | + | This program is free software: you can redistribute it and/or modify it under the terms of the Apache License. |
| valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | ||
Line 22: | Line 22: | ||
== Project Resources == | == Project Resources == | ||
− | [ | + | [https://docs.google.com/presentation/d/1ezyIem3OJrC7gWxmllG6LzLFjhpBDetOlQIfaocg1T8/ Slide Deck] |
− | [https://github.com/ | + | [https://github.com/shrutiguptagt/Security_Ninjas_AppSec_Training Source Code] |
− | [https://registry.hub.docker.com/u/ | + | [https://registry.hub.docker.com/u/shrutiguptagt/security-ninjas/ Docker repo and instructions] |
== Project Leader == | == Project Leader == | ||
Line 47: | Line 47: | ||
=FAQs= | =FAQs= | ||
− | 1. What is special about this project? | + | '''1. What is special about this project? |
+ | ''' | ||
- This is one of the very few projects which offers systematic, guided hands-on AppSec training to folks with very minimal AppSec or Penetration Testing knowledge. | - This is one of the very few projects which offers systematic, guided hands-on AppSec training to folks with very minimal AppSec or Penetration Testing knowledge. | ||
This would not only teach you how to find and exploit vulnerabilities but also hot to fix them and not have them in the first place! In today's world of advancing web attacks and seeing how complicated web applications are becoming, this training is something that every software engineer should take. | This would not only teach you how to find and exploit vulnerabilities but also hot to fix them and not have them in the first place! In today's world of advancing web attacks and seeing how complicated web applications are becoming, this training is something that every software engineer should take. | ||
− | 2. How much time does it take to set up the hands on lab? | + | '''2. How much time does it take to set up the hands on lab? |
+ | ''' | ||
- If you use the docker build, it takes only a few seconds to setup the lab! | - If you use the docker build, it takes only a few seconds to setup the lab! | ||
− | 3. Is it hard to setup and destroy the hands-on lab container? | + | '''3. Is it hard to setup and destroy the hands-on lab container? |
+ | ''' | ||
- It is super simple to set up and destroy the container. If use docker, there are no dependency issues as well, no matter what platform you are using! | - It is super simple to set up and destroy the container. If use docker, there are no dependency issues as well, no matter what platform you are using! | ||
− | 4. Why did I chose Docker? | + | '''4. Why did I chose Docker? |
+ | ''' | ||
- Setting up and destroying the environment would be super easy and quick. | - Setting up and destroying the environment would be super easy and quick. | ||
- The docker container would be sandboxed which means that the vulnerable application wouldn’t be able to harm the host OS. | - The docker container would be sandboxed which means that the vulnerable application wouldn’t be able to harm the host OS. |
Latest revision as of 16:56, 22 August 2016
1. What is special about this project? - This is one of the very few projects which offers systematic, guided hands-on AppSec training to folks with very minimal AppSec or Penetration Testing knowledge. This would not only teach you how to find and exploit vulnerabilities but also hot to fix them and not have them in the first place! In today's world of advancing web attacks and seeing how complicated web applications are becoming, this training is something that every software engineer should take.
2. How much time does it take to set up the hands on lab? - If you use the docker build, it takes only a few seconds to setup the lab!
3. Is it hard to setup and destroy the hands-on lab container? - It is super simple to set up and destroy the container. If use docker, there are no dependency issues as well, no matter what platform you are using!
4. Why did I chose Docker? - Setting up and destroying the environment would be super easy and quick. - The docker container would be sandboxed which means that the vulnerable application wouldn’t be able to harm the host OS.
Volunteers
- Shruti Gupta Shruti Gupta
The first contributors to the project were:
- Shruti Gupta Shruti Gupta created the OWASP Security Ninjas project
Roadmap
The project is complete.
Getting Involved
If you have suggestions/ comments about how this project could be made better, please email Shruti Gupta .
This category currently contains no pages or media.