This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Education"
From OWASP
| Line 47: | Line 47: | ||
| + | == Chapter Presentations == | ||
| + | {| border="1" cellpadding="2" | ||
| + | |+ Chapter Presentations | ||
| + | !width="30%" |Title | ||
| + | !width="30%" |Comment | ||
| + | !width="10%" |Level | ||
| + | !width="10%" |Rating (1-10) | ||
| + | !width="10%" |Month | ||
| + | !width="10%" |Chapter | ||
| + | |||
| + | |-valign="top" | ||
| + | |[http://www.disenchant.ch/blog/files/presentations/pres_20070206_04_svetsch_xss_worms.pdf XSS and XSS Worms (Sven Vetsch)] || XSS and XSS Worms || Intermediate || 7 || Feb 2007 || [[Switzerland|Switzerland]] | ||
| + | |-valign="top" | ||
| + | |[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_OWASP_Update.zip OWASP Update (Seba)] || OWASP Update || Novice|| 7 || Jan 2007 || [[Belgium|Belgium]] | ||
| + | |-valign="top" | ||
| + | |[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_WebGoat-Pantera.zip WebGoat and Pantera presentation (Philippe Bogaerts)] || WebGoat and Pantera presentation || Novice || 7 || Jan 2007 || [[Belgium|Belgium]] | ||
| + | |-valign="top" | ||
| + | |[http://www.owasp.org/index.php/Image:OWASP_BE_2007-01-23_AOP_security.zip Security implications of AOP for secure software (Bart De Win)] || Security implications of AOP for secure software || Expert || 7 || Jan 2007 || [[Belgium|Belgium]] | ||
| + | |-valign="top" | ||
| + | |[http://www.owasp.org/images/1/12/OWASP_Denver_Nov-06_presentation.ppt testing for common security flaws (David Byrne)] || testing for common security flaws || Intermediate || 7 || Nov 2006 || [[Denver|Denver]] | ||
| + | |-valign="top" | ||
| + | |[http://www.owasp.org/images/7/7c/Owasp-olli.pdf 40-ish slides on analyzing threats (Olli)] || Analyzing Threats || Novice || 7 || Dec 2006 || [[Helsinki|Helsinki]] | ||
| + | |-valign="top" | ||
| + | |[http://www.owasp.org/images/2/2c/KC_Dec2006_Attacking_The_App.pdf Attacking the Application (Dave Ferguson)] || Vulnerabilities, attacks and coding suggestions || Intermediate || 7 || Dec 2006 || [[Kansas City|Kansas City]] | ||
| + | |-valign="top" | ||
| + | |[http://www.owasp.org/images/6/6a/KC_Dec2006_Ajax_Security_Concerns.pdf Ajax Security Concerns (Rohini Sulatycki)] || Ajax Security Concerns || Intermediate || 7 || Dec 2006 || [[Kansas City|Kansas City]] | ||
| + | |||
| + | |-valign="top" | ||
| + | |Example (include link) || Fill in your comments || Novice/Intermediate/Expert || 1:bad - 10: the best || Mon Year || Chapter | ||
| + | |} | ||
[[Category:OWASP Education Project]] | [[Category:OWASP Education Project]] | ||
[[Category:OWASP Presentations]] | [[Category:OWASP Presentations]] | ||
Revision as of 08:58, 2 March 2007
This page provide a commented overview of the OWASP presentations available.
Please use the last line of the tables as template.
Presentions can be tracked through:
- the OWASP Presentations Category
- Past OWASP Conference agenda's
- From the chapter pages
Everybody is encouraged to link the presentations and add their findings on this page ! There are currently hundreds of presentations all over the OWASP web site. If you search google with “site:owasp.org filetype:ppt” there are 166 hits. “site:owasp.org filetype:pdf” returns 76. Feel free to “mine” them and add them to the overview.
OWASP Project Presentations
| Title | Comment | Level | Rating (1-10) |
|---|---|---|---|
| The OWASP Testing Guide (Jeff Williams) | Overview of the OWASP Testing Guide | Novice | 7 |
| Example (include link) | Fill in your comments | Novice/Intermediate/Expert | 1:bad - 10: the best |
Web Application Security Presentations
| Title | Comment | Level | Rating (1-10) |
|---|---|---|---|
| [Advanced SQL Injection (Victor Chapela) | Detailed methodology for analyzing applications for SQL injection vulnerabilities | Expert | 9 |
| [Advanced Topics on SQL Injection Protection (Sam NG) | 7 methods to prevent SQL injection attacks correctly and in a more integrated approach. Methods 1 to 3 are applicable during design or development life cycle. Method 4 is mainly from QA’s perspective. Methods 5 and 6 can be applied to production environment and are applicable even if you do not have access to or if you cannot change the source code. Other non-main stream technology are discussed in Method 7. | Intermediate | 8 |
| [Attacking Web Services (Alex Stamos) | Web Services Introduction and Attacks | Intermediate | 5 |
| Example (include link) | Fill in your comments | Novice/Intermediate/Expert | 1:bad - 10: the best |
Chapter Presentations
| Title | Comment | Level | Rating (1-10) | Month | Chapter |
|---|---|---|---|---|---|
| XSS and XSS Worms (Sven Vetsch) | XSS and XSS Worms | Intermediate | 7 | Feb 2007 | Switzerland |
| OWASP Update (Seba) | OWASP Update | Novice | 7 | Jan 2007 | Belgium |
| WebGoat and Pantera presentation (Philippe Bogaerts) | WebGoat and Pantera presentation | Novice | 7 | Jan 2007 | Belgium |
| Security implications of AOP for secure software (Bart De Win) | Security implications of AOP for secure software | Expert | 7 | Jan 2007 | Belgium |
| testing for common security flaws (David Byrne) | testing for common security flaws | Intermediate | 7 | Nov 2006 | Denver |
| 40-ish slides on analyzing threats (Olli) | Analyzing Threats | Novice | 7 | Dec 2006 | Helsinki |
| Attacking the Application (Dave Ferguson) | Vulnerabilities, attacks and coding suggestions | Intermediate | 7 | Dec 2006 | Kansas City |
| Ajax Security Concerns (Rohini Sulatycki) | Ajax Security Concerns | Intermediate | 7 | Dec 2006 | Kansas City |
| Example (include link) | Fill in your comments | Novice/Intermediate/Expert | 1:bad - 10: the best | Mon Year | Chapter |