This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Education/Free Training"

From OWASP
Jump to: navigation, search
m (Added links to user pages for trainers)
Line 38: Line 38:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]], [[user:MichaelCoates | Michael Coates]]
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013
Line 45: Line 45:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]], [[user:MichaelCoates | Michael Coates]]
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
Line 52: Line 52:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]], [[user:MichaelCoates | Michael Coates]]
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
Line 59: Line 59:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]], [[user:MichaelCoates | Michael Coates]]
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/c/cf/Injection-4.pptx Injection]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/c/cf/Injection-4.pptx Injection]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
Line 66: Line 66:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]], [[user:MichaelCoates | Michael Coates]]
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/e/e7/XSS_-_5.pptx XSS]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/e/e7/XSS_-_5.pptx XSS]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
Line 73: Line 73:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]], [[user:MichaelCoates | Michael Coates]]
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/9/9d/ClickJacking_-_6.pptx UI Redress]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/9/9d/ClickJacking_-_6.pptx UI Redress]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
Line 80: Line 80:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]], [[user:MichaelCoates | Michael Coates]]
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/8/8e/Risks_of_Insecure_Communication_-7.pptx SSL-TLS]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/8/8e/Risks_of_Insecure_Communication_-7.pptx SSL-TLS]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
Line 87: Line 87:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]], [[user:MichaelCoates | Michael Coates]]
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/6/6e/Virtual_Patching_-8.pptx Virtual Patching / WAF]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/6/6e/Virtual_Patching_-8.pptx Virtual Patching / WAF]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
Line 94: Line 94:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]], [[user:MichaelCoates | Michael Coates]]
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/a/a8/Web_App_Access_-_9.pptx Access Control]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/a/a8/Web_App_Access_-_9.pptx Access Control]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014

Revision as of 15:28, 1 October 2014

Owasp banner web edu.jpg

The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security. Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!


If you are interested in setting up a training event through OWASP, submit your request here, we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. Click here for more information.


Here are some general guidelines we have set up for free training courses within the OWASP Community:

  1. Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs
  2. Use open source training materials - we ask that you make your training materials available after the course, preferably in an editable format
  3. Use OWASP template for slides and keep any company branding to one bio slide
  4. Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate
  5. If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)

Credits: The following has been donated by Jim Manico and Eoin Keary and their respective companies

Training Courses, Trainer Data, and Material
Training Name/Topic Trainer Name(s) Training Materials Training Location Training Date Number of Attendees
Application Security – Where do I start? Jim Manico, Eoin Keary, Michael Coates Training Slides Jillians
San Francisco, CA
Feb 24, 2014 200
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary How_Do_I_Approach_Application_Security-1 RSA 2013 EU, RSA 2013 USA, Lascon 2013 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary HTTP Basics RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary Secure Storage RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary Injection RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary XSS RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary UI Redress RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary SSL-TLS RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary Virtual Patching / WAF RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary Access Control RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+