This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Education/Free Training"

From OWASP
Jump to: navigation, search
 
(17 intermediate revisions by 7 users not shown)
Line 3: Line 3:
 
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!
 
The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security.  Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!
  
 +
 +
*NEW* 11-April 2016, OWASP is experimenting with GOTOTraining as a platform to enable project leaders to provide training on their project to the world. For more information [https://www.owasp.org/index.php/Education/Virtual_Classroom CLICK HERE]
  
  
Line 16: Line 18:
 
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)
 
# If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)
  
 
+
'''Credits:
 +
A sincere thank you to Eoin Keary, Jim Manico, Dan Cornell, Josh Sokol and others who generously donated training content referenced below.'''
  
 
{| style="width:100%" border="0" cellpadding="1" align="center"
 
{| style="width:100%" border="0" cellpadding="1" align="center"
Line 28: Line 31:
 
  | style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" | '''Training Date'''
 
  | style="width:10%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" | '''Training Date'''
 
  | style="width:15%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" | '''Number of Attendees'''
 
  | style="width:15%" valign="middle" height="30" bgcolor="#CCCCEE" align="center" | '''Number of Attendees'''
 +
|- valign="bottom"
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Analyzing (Java) Source Code for Cryptographic Weaknesses- Editable slides (ODP), with speaker's notes, and non-editable (PDF), without speaker's notes
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Kevin W. Wall | Kevin W. Wall]]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[File:kwwall-owasp-prezo-CryptoCodeWeaknesses--2015-12-03.odp]] and [[File:kwwall-owasp-prezo-CryptoCodeWeaknesses--2015-12-03.pdf]]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Columbus, OH OWASP Chapter
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Dec 03, 2015
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" |18
 +
|-
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Introduction to Application Security - Editable slides (pptx)
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jsokol | Josh Sokol]], [[user:Dancornell | Dan Cornell]]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/f/f2/LASCON_2015_-_Web_Application_Developer_Security_Training.pptx Training Slides]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [http://www.lascon.org LASCON 2015]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | October 21, 2015
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" |100
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Application Security – Where do I start?
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Application Security – Where do I start?
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Jim Manico, Eoin Keary, Michael Coates
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]], [[user:MichaelCoates | Michael Coates]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/4/44/OWASP-SF-2014.pdf Training Slides]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Jillians <br> San Francisco, CA
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Jillians <br> San Francisco, CA
Line 37: Line 54:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Jim Manico, Eoin Keary, Michael Coates
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/4/4e/How_Do_I_Approach_Application_Security-1.pptx How_Do_I_Approach_Application_Security-1]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013
Line 44: Line 61:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Jim Manico, Eoin Keary, Michael Coates
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/c/ce/HTTP_Basics_-_2.pptx HTTP Basics]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
Line 51: Line 68:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Jim Manico, Eoin Keary, Michael Coates
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/f/fb/Secure_Storage_-_3.pptx Secure Storage]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
Line 58: Line 75:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Jim Manico, Eoin Keary, Michael Coates
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/c/cf/Injection-4.pptx Injection]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/c/cf/Injection-4.pptx Injection]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
Line 65: Line 82:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Jim Manico, Eoin Keary, Michael Coates
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/e/e7/XSS_-_5.pptx XSS]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/e/e7/XSS_-_5.pptx XSS]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
Line 72: Line 89:
 
|- valign="bottom"
 
|- valign="bottom"
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Jim Manico, Eoin Keary, Michael Coates
+
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/9/9d/ClickJacking_-_6.pptx UI Redress]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/9/9d/ClickJacking_-_6.pptx UI Redress]
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" |  
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" |  
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" |1000+
 
  | valign="middle" height="30" bgcolor="#EEEEEE" align="center" |1000+
|-
+
|- valign="bottom"
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/8/8e/Risks_of_Insecure_Communication_-7.pptx SSL-TLS]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" |
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" |1000+
 +
|- valign="bottom"
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]], [[user:Cassio_Goldschmidt | Cassio Goldschmidt]]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/8/82/OWASP_HTTPS_Talk_v3.pptx HTTPS Best Practices]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | AppSec Cali 2015, SoCal 2015
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" |
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" |500+
 +
|- valign="bottom"
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/6/6e/Virtual_Patching_-8.pptx Virtual Patching / WAF]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" |
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" |1000+
 +
|- valign="bottom"
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | Approaching App Sec - Editable slides (pptx)
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [[user:Jmanico | Jim Manico]], [[user:EoinKeary | Eoin Keary]]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | [https://www.owasp.org/images/a/a8/Web_App_Access_-_9.pptx Access Control]
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" | RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" |
 +
| valign="middle" height="30" bgcolor="#EEEEEE" align="center" |1000+
 +
|- valign="bottom"
 
|}
 
|}
 +
[[Category:SAMM-EG-1]]

Latest revision as of 01:58, 12 April 2016

Owasp banner web edu.jpg

The following courses either have been offered or are being offered free of charge courtesy of the trainers and the OWASP Foundation to anyone interested in learning about application security. Additionally, the training slides/coursework is available under an open source license and we encourage you to use it to set up your own training event!


  • NEW* 11-April 2016, OWASP is experimenting with GOTOTraining as a platform to enable project leaders to provide training on their project to the world. For more information CLICK HERE


If you are interested in setting up a training event through OWASP, submit your request here, we also have funding available to community members who may need help with travel, a venue or other logistics to get the event up and running. Click here for more information.


Here are some general guidelines we have set up for free training courses within the OWASP Community:

  1. Use free and local when possible - donated venues or universities as well as trainers that are near by will help save on overhead costs
  2. Use open source training materials - we ask that you make your training materials available after the course, preferably in an editable format
  3. Use OWASP template for slides and keep any company branding to one bio slide
  4. Do an open call for training when possible to avoid giving preference to any one vendor/trainer and give others in the community a chance to participate
  5. If possible, do the training in a way and time that doesn't compete with paid training (especially at Global AppSec Conferences)

Credits: A sincere thank you to Eoin Keary, Jim Manico, Dan Cornell, Josh Sokol and others who generously donated training content referenced below.

Training Courses, Trainer Data, and Material
Training Name/Topic Trainer Name(s) Training Materials Training Location Training Date Number of Attendees
Analyzing (Java) Source Code for Cryptographic Weaknesses- Editable slides (ODP), with speaker's notes, and non-editable (PDF), without speaker's notes Kevin W. Wall File:Kwwall-owasp-prezo-CryptoCodeWeaknesses--2015-12-03.odp and File:Kwwall-owasp-prezo-CryptoCodeWeaknesses--2015-12-03.pdf Columbus, OH OWASP Chapter Dec 03, 2015 18
Introduction to Application Security - Editable slides (pptx) Josh Sokol, Dan Cornell Training Slides LASCON 2015 October 21, 2015 100
Application Security – Where do I start? Jim Manico, Eoin Keary, Michael Coates Training Slides Jillians
San Francisco, CA
Feb 24, 2014 200
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary How_Do_I_Approach_Application_Security-1 RSA 2013 EU, RSA 2013 USA, Lascon 2013 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary HTTP Basics RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary Secure Storage RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary Injection RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary XSS RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary UI Redress RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary SSL-TLS RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary, Cassio Goldschmidt HTTPS Best Practices AppSec Cali 2015, SoCal 2015 500+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary Virtual Patching / WAF RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+
Approaching App Sec - Editable slides (pptx) Jim Manico, Eoin Keary Access Control RSA 2013 EU, RSA 2013 USA, Lascon 2013, OWASP AsiaPac 2014 1000+